last executing test programs: 4.869430308s ago: executing program 2 (id=1483): r0 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x3, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x4044}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004680)={&(0x7f0000003600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x4, 0x1, 0x0, 0x6, 0x4, [{0x3}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000003680)=""/4096, 0x32, 0x1000, 0x1}, 0x28) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x34120, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x7, 0x7ff}, 0x8386}, 0x0, 0x1, 0xffffffffffffffff, 0x3) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/pid\x00') 4.8549644s ago: executing program 2 (id=1484): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000040000000c"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000240)=r2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x3, 0x7, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000a000000000000000700000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7020000000000d3101051cfd9b3d56fcb7200850000008640009d3306b20785c7ba00"], &(0x7f0000000300)='syzkaller\x00', 0xbc3, 0x0, &(0x7f0000000340), 0x41100, 0x48, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xd, 0xd4f, 0xfffffffa}, 0x10, 0x0, r2, 0xa, &(0x7f0000000400)=[r0, r0, 0xffffffffffffffff, r3, r1, r3, r1, r0], &(0x7f0000000440)=[{0x3, 0x3, 0x5, 0x4}, {0x1, 0x4, 0x7, 0xb}, {0x5, 0x3, 0x0, 0x7}, {0x0, 0x5, 0x0, 0xb}, {0x1, 0x2, 0x8, 0x1}, {0x0, 0x4, 0x1, 0x9}, {0x3, 0x5, 0xc, 0x1}, {0x2, 0x1, 0xe}, {0x3, 0x5, 0x0, 0x5}, {0x0, 0x2, 0x3}], 0x10, 0x2}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000001c40)="b9ff03076804268c989e14f088a8", 0x0, 0x500, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) gettid() 4.807662668s ago: executing program 1 (id=1485): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x205, 0x9442d, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x253, 0x400000, 0x9cb, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x50) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x8e20, 0xa2a}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x87, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x2, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x85, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @perf_bp={0x0, 0xc}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000010000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x5, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000d40)) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x8, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xc57) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x10, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@call={0x85, 0x0, 0x0, 0xa0}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) close(r0) 4.752691137s ago: executing program 2 (id=1487): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r0}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c0000000300000001000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r2}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000140), &(0x7f0000000000)=""/48}, 0x20) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8992, &(0x7f0000000cc0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00l \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a00), 0x101d0}], 0x4}, 0x0) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x7fff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1}, 0x50) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f00000009c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0xb, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2, 0x5}}, @volatile={0x4, 0x0, 0x0, 0x9, 0x5}, @var={0xd, 0x0, 0x0, 0xe, 0x1, 0x2}, @enum={0xc, 0x9, 0x0, 0x6, 0x4, [{0x10, 0x8}, {0x8, 0x7}, {0x1, 0x2}, {0xe, 0x8}, {0x8, 0x7}, {0xe, 0x200}, {0x1}, {0xf, 0x6}, {0x10, 0x3}]}, @typedef={0xe, 0x0, 0x0, 0x8, 0x5}, @decl_tag={0x4, 0x0, 0x0, 0x11, 0x2, 0x4}]}, {0x0, [0x2e, 0x2e, 0x5f, 0x2e, 0x5f, 0x30, 0x2e, 0x61, 0x5f]}}, &(0x7f0000000b80)=""/246, 0xc7, 0xf6, 0x0, 0x2}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x20, &(0x7f0000000880)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x9}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7fffffff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ldst={0x0, 0x3, 0x6, 0x1, 0x2, 0xfffffffffffffff8, 0x4}, @jmp={0x5, 0x0, 0xb, 0x5, 0x1, 0x10, 0x1}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @call={0x85, 0x0, 0x0, 0x37}, @map_fd={0x18, 0xf, 0x1, 0x0, r4}, @exit], &(0x7f0000000580)='GPL\x00', 0x40000000, 0xe, &(0x7f0000000600)=""/14, 0x40f00, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000780)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000ac0)={0x2, 0xc, 0x80000001, 0x358}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000b00), 0x0, 0x10, 0x4}, 0x94) sendmsg$inet(r3, 0x0, 0x20008001) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r6) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x5, 0x7, 0x8, 0x5, 0x80}, 0x50) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4030582a, &(0x7f0000000040)=0xd58f4) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r7, 0x2000012, 0x0, 0x0, 0x0, 0x0, 0x7ffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000030000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000009600"/28], 0x50) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x3, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006100000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r10, 0x27, 0xe, 0x0, &(0x7f00000005c0)="f8ad48cc02cb29dcc8007f5b0800", 0x0, 0x4000, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.489340309s ago: executing program 1 (id=1496): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x2}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="130000001000000008"], 0x50) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000940)={0x8, 0xf, &(0x7f0000000a80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7020000000000008500000051000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000005000000b70000000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)=ANY=[@ANYRES32=r3, @ANYRES32=r5], 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r4, &(0x7f0000000100), 0x0}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x10000}, 0x28) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1f, 0x13, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0xc8ae}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x38, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.344736188s ago: executing program 1 (id=1501): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@bloom_filter={0x1e, 0x7ff, 0x5, 0x3, 0x2a22, 0xffffffffffffffff, 0x8b55, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0x2}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xd0}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r1, r0}, 0xc) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f00000021c0)=ANY=[@ANYBLOB="b70200001000b15cbfa300000000000007030000f8ffffff7a0af0ff0000000079a4f0ff00000000b706000000000081ad64020000000000450404000100ff0f1704000001130a00b7050000010000006a0af2fe0000000085000000a3000000b700000000000000950000000000000000e154cd8445974b26c933f7ffffffffe4fbffffff55bb2007ee51050512b5b42128aa090a79507df79f298129daa7a6b2f91af50342115e17392ac627c87867c000006146001e04aeacea799a22a2fa798b5adc43eb27d53319d0ad229e5752548300000000dbc2777df150b7cdd77b2314fd085f028f2ed1a4535550614e09d6378198a6097a670838337af2abd55a87ac0394b2f92ffab7d153d62058d0a413b2173619ccf55520f22c9ca8b6712f3024b7041b1df65b3e1b9bf115646d14ce53d13d0ccacda1ef0900094fa737c28b99938512c816fdcceaede3faedc51d29a47fc813a2ec00f4c7a53ac271d6d7f4ea6bf97f2f33e2ea2e534300bcb3fdc4b4861004eefbda7f54f82a804da4f86bb47a4a69bf9bc5fa96ee293fbd165a5a68488e40b030166565a097b1b44b451de736bb6d43db8dd63d4b77b206000000000000e254a6d491b849a5a787e814c4fd21a18986252a70f8f92eb6f0e8c7db4bf23242a1f2c28159f09943b1b0452d1b72183aacf4a84f9130b775dd4e9e3070756f97ad91935a6ddfa8f90e79321a0574fb30ff0000001989328c8ddc20ea011bf5742e0e0d4334db8b20ce3f9f16cb7fc20fb4791ec85821d0c48fb657c29b309c73f0977e7cde65a82b94c461d7962b0d2277a84af326f3813e2c25a61ec45c3af9948f17da954aff3fc8c108755f75ca13fb7c8bbd8b6e7dac1aba4b20dc7de058a4dfa7e85a8bdf1d41a2d8bda74d66f47cc180f82c5f573c6d294d3665016ac59dda0fde4745db06753a7ac74a2d32f7528751313694bf5700b20ef0c248ddd3da32396a614cacad4aff2066bb5d4045c958559b7dcb98a6273b8c651e24d9f679e4fbe948dfb4cc4a389469600241730459f0123fd39206000000000000eb55dad46de56ef907b059b90b8aa49afb9a79ae5498f6589880ed6eea7b9c670012be05e7de0940313c5870786554df26236ebced9390cb6941b8375d936a7d2120eca291963eb2d537d8ee4de5c12e28ef97d9ebd9c77f1774cf4683c960119451c31539b22809e1d7f0cda06a9fa87d64cb77872a2cd8a104e16bb1a2bacf13464ca03aff14a9aa4bd9539f5096412b92012e095b84c20243ff98df3347f011000000f27e3c33269c0e153b28b2d4410572bc45b9d3fa02208d304d455c36300000000022320178b00cc6ed7966130b547dbf8b497a6103876843ee04ed9ff002000000cd1d00000020000000ef19349ee7f31abc11c800000000000000000000000928ee53595a779d243a48cea769470424d28804c04b2c4324ab7f4a5c81921f0128dfd70b438af60b060000000000000056642b49b745f3bf2cf7908b6d7d748308eea09fc361b4735efbf3411718d6ee7aebf9ef679dbfae9fb4a79f8a836804ed3a1079b0282a12043408cd60b687dcff91af19010000000000000000456f7d2a42bd1304202274f20675eb781925440578e93046aaddea8ec4ca37f71c2710a7ea8ae0dc214e1cc275b26adfa892e6de92000000000000000000ddff004cff9ec780f535e62f4eeee50e5bafecea4d4134f9d006c8d6883eca5c9c58c9e9338c73de2f04f15d005387577f480000ea65559eb00e76e9d0ada201bcbb5c252b28a60ca770663da451790cc36000906d5a9fad98c308e39bd5ffb6151d79c1cee1cd102e3c8e63e9fba05e3633be3f00000015762e5f5a3a0bc33fdbe28a5ffc83f2b485185cc92fe7f791e8f6429309d6adab4b96508e5bf024ed8f8a005f2bbf96c89739f5cf1e750d50517a59a3ad09e8802e8f4f535447cc0fc9d5f99a73145dfcedad69da9cd4375c624600e78f4458542b14f29611f95d4a31838eeb20c20bb82aa31771cd379ec83554cea5e6539db7384e1f58d81f2f2653c4d9818708e25c89b552d7fcd116bce9c764c714c9402c21d1aac59efb28d4f91652f6000000000000000320f8059195729d60c534ee8e8ff0755b67fe4c25edb85bcff24c757aa8090000000000008c420eb4304f66e3a37aaf000000c42a575939206d0c0f0e9dd5fd545470f862f8c3c14fa9ecd1e877b0d8ca84c044859e85e6158f9184bc61a9a284db80e4636c25b96174327d82761c26e329555f9290af4100000000000000ff0ffd3763655500344bae34137f5ab0d534b8d63e4ca3b671f2de1cdf519192c6b59a601fd419adc16e2055b85058f793484305d7a1759782e4c571ee855a47bc00edf5e9020c09ab004321610b857e8717764b633b21cb32f0e03280e09758bd445ab91d20baca005452b79d7b574a247f1d2fe45b3c4e93da3d51de647c10dd49944dc87c92332af00f191b66b6a6f732a91f0e2e9120be61e58c79d497247d278888901d442ad7f8536607a644e9e3d769db497c3960dfde12182334caee994adc38a436367a54b9e182b78e9a0ceb9a2c4f63902c1ad1a7c5a08d0920a23c2a86abbdf357849a651733e57f31019876026888c8ccb85c86b4f8ffffff7f000000002c331fca0e541b7ca211c28ed61c525708a13d115b43f8b1894c8fa8a14dc4810f61ae96c18cc7130000000000002100000000000000000001000027c9a46157a3609b6fd9843ee19ec647249a9375de5858818f3c4a4fa6ce46f4d42b07199de8b99231ace58c77819ee214e49666c464d35ca9b5143ed3b3dc8c17a23692759ccf5a205311b7ab22532697b861dfb54609fd88e6043bd52ae84c1bb0c8000000edb3d42c68a27ef6a1296dfff4a979369b0e8ebc62887aa46e820a74f91381dcc198e353047db70686d147357024eb3cb94f1e89cb5ba0a56aa046b4dc521a3d9356b4b8b5917c4c860495b240e80063bde261fd00000000007271e28ef6806bc8e139c49b91c76bea3858f7f05b47d3e519f1634e8fbd8d31330d89069f9648a2ff93060ff073b3a113e47edf76f7b0976cf2ec447c030931651dd315003b7a6a5433a2bb560ae99ec4b227eda2e63a1c31a2c2bd48a822cbe92b6524e0cd8020ecaa34e19e7141d5e221509342bfe7d294d1eb3de6a50ca0301f89c2ee627e949c68b3a4a426a996d503a26e9a714ee5f72d8805dd1bfbd081f6a5d1f1289dfe14cb9194e26a44fac273461fc5c0e0a33db76cf059f40fa2640b6bfb74dd35391b8fa18479da9f4b6641fce9a24b96767b837ca037a1199735c375c705c798e0e208e4a5259d0bfa526b462af45a6eab34000000000000000000000000c4426344ec1a3366515dee221e747f55d7dd02534bc503b9b28277c253e410986bef2111a99cc448d652929f8a67a6a1d3f00dcad91aff428aade3f85714a1d3ef29acd4d49b62339c10c2ec0dac4728288e78980c1184d8223edbccbf9258b7374e79a1f8bf3fb73c8c6dbb7bbdfc399847db97c02461792e3a49dac16c60c3fcaab222025d78963c3ac899fa8b63f58a30212c9b2d7fe751e2046b78f86e22861b6504c667350244dd6d9189a8b9c45f8aaff9db694811ca86ed978f23eed7459c0382074170cf1e25b0e9ba3d1cc309353eea4cd8ab96bafda393276bdd8d32ead8db9e1b252a37ff7e0d45728fc1a6ec566981bc8ccfe6cc1897449ba5f26a9d66ac73e6f5c401376f23a314e0b9ff997d22f3e34b7524642c248aa813edaa626f0000000000000000000000000000000003ba34b611569a451564d3a5400f9097ffe7a37e765be352be71ee24250d6828562c7e24cb763062d6000c409de6a6135eae8a00000000008d797190a26c933f933aff5c521eeb7a84a62d148a846e74e76b515b6b8be29e8b69310fa130cf6d6b74f33205d3cc218ca554ed8085ae044f5bf2e89a0000bde05c114e7a020fc1a5fd3eeeb822008b2d7d1cc062b51b0aca4956b557e51a1385cc572b0074b0950fb1437de2590bf99ec7ceb69e1fe2465fce099c992d57b804a22e148ae3411523814aee03ee2df877edfabf4aa94f07c6fdd127e57a8bf7975f2e606c25a299980a6e52fcf7849d45bb38573fbba8afef1aa7a24c805f7aee3e39a3000000000000000000000000000000000000878f88c4742ac490951c36c610a0d266588ec6a0bd300cf160b5a5d9e9fafa49ecc8430832d795e727b7fc2b76e7fc4141fdbb82f45d3cdd3fb8d4b443ab4954fdf5c1b9a6ab3e457f098329307ccb0a1989b6c37509692e952e7244f48bc12569ff8eb30d0f887b85b5ef44fb9a7571319190be0c226ed72f346cc4aa071ae0c72fa8bd00d5590c4f4ba65d0c8e1f4870fe3c414681e41b40163eb1aa2a7429a2208cd6e69c7d959e87da3fd0101159a03ab7fe78881ee7a1ee7a2edff75fb18a181e0c54352be2b7a5b5273198291c28d9141deeb3cdba5d414ae4b0000000000000000000000000009eacd83458d8a606be71970497a4fd4ca3b48ca482ab3804e2fac216b3ba613608b1a465456a33fd08491d337d7344c01cfc9e73bf1bca1cbec7614c8c3c76411e61fef6a93da8914490b50bd837d068e9bf8f3348794a44115d163b5ff85629b0a3ad4023448140770de2e5f262b9a50afcc210b8d8ea24b6dd7d068b356f53afaf89acae30935ec92657e37bf0821cbe612ac2aa7baf4d21ab373ea4fea57d0d9ac418862e791df3d1d85bb780fbfa401e09e3745d70174dd9ab52cdcadfd3454916408810090a19fa1cf0df6aa714fbcffbb7d6c7f45237df3296867725fd2bdbcd2f7ab10fea0fe85ce1137e775e4c01a136aed7f1d0d192a95be64bab53144ff3efd87fcb6421483e6a1690408712913dfb10a88201340c96dfd745a84dc177dd7a598ec015daa56eb0924e01df353a9ad69d0a59e40203018c82e74f39f8c4cb8823f0bfdfe170549e305628625f50"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000040)}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r2, 0x0, 0xe, 0x0, &(0x7f0000000300)="14fd54ab72df97e6256c00000000", 0x0, 0xfeff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x6af}, 0x0, 0x0, 0x0, 0x7, 0x0, 0xb, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x11, 0x4, 0x4, 0x8, 0x800, 0xffffffffffffffff, 0x3}, 0x50) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000b00)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000006000000040000000000000e0400000000000000000000000000000500000000020000000000000802000000000000000000000a0300000000005f0061"], 0x0, 0x52}, 0x28) bpf$ENABLE_STATS(0x20, 0x0, 0x0) getpid() socketpair$tipc(0x1e, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x6, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000005"], 0x48) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{r4}, &(0x7f0000000400), &(0x7f0000000500)=r5}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400), 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x6, 0x13, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020200008500000072000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r6, 0xfca804a0, 0xd, 0x0, &(0x7f0000000000)="9b352e98d1dc0621a18bc4c5a6", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="09000000030000000400010005"], 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0200000004000000060000000500000000100000", @ANYRESOCT=r3, @ANYBLOB='\x00'/20, @ANYRES16=r2, @ANYRES32, @ANYRES32=r7], 0x50) 1.174712616s ago: executing program 0 (id=1502): r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x1, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x59, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000000, 0x6}, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2, 0x8a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000009c0)={0x2, &(0x7f00000001c0)=[{0x25, 0x0, 0x0, 0x37cb7880}, {0x6, 0x0, 0x0, 0x8007}]}) sendmsg$inet(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000200)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa15, 0x0, 0x7, 0x1, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f2, &(0x7f0000000080)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1e0000000000000004a60000030000000097ef000000d667cad886816765ca85504b30d6bd86ea06c70cd0d34f71311727f08b1013217aea873d362bc5de2fe9e4902ce7c666324c154badf3061630e12625d0ddf776664cd243594f1c06f13d7f3b51f7be9954e68e5713bd900237ae4996bf83e3020000000000001400"/137, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_subtree(r7, &(0x7f00000000c0), 0x2, 0x0) write$cgroup_subtree(r8, &(0x7f0000000100)={[{0x2d, 'io'}, {0x2b, 'net_cls'}]}, 0xd) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r6, 0x0, &(0x7f0000001700)=""/53}, 0x20) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x80}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="1802000005000000000000000000000085000000870000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000080)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r9, 0x2000, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.143510611s ago: executing program 1 (id=1503): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x541b, 0xf0ff1f00000000) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) sendmsg$tipc(r4, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)=""/163, 0xa3}], 0x1}, 0x8040) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x480283, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x8}, 0x7606, 0x3ff, 0x80000000, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffc) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) bpf$ENABLE_STATS(0x20, &(0x7f0000000080), 0x4) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) 863.607507ms ago: executing program 3 (id=1506): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x8, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 783.601201ms ago: executing program 3 (id=1507): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000440)={'syzkaller0\x00', 0xca58c30f81b6079f}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x2c0800, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$SIOCSIFHWADDR(r2, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random}) 728.50267ms ago: executing program 4 (id=1510): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1e, 0xf, &(0x7f0000000000)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x6}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0x6}}, {{0x5, 0x0, 0x3}, {0x95, 0x0, 0x0, 0x4}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x4}, {0x85, 0x0, 0x0, 0xa0}}}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_lookup=0x24, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 727.00703ms ago: executing program 0 (id=1511): perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x5, 0x2, 0x4}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000010000000400000008"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x5110, 0x0, 0x3, 0x5, 0x1, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfff, 0xec8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000000640), 0x40002, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x1f, 0x15, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000fcffffff000000008000000018010000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000020000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000a600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000850000008200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000611889000000000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}, 0x94) 656.866071ms ago: executing program 4 (id=1512): bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x3, [@type_tag={0xc, 0x0, 0x0, 0x12, 0x1}, @int={0x9, 0x0, 0x0, 0x1, 0x0, 0x7c, 0x0, 0x24, 0x6}, @decl_tag={0xe, 0x0, 0x0, 0x11, 0x2, 0x9}]}, {0x0, [0x2e]}}, &(0x7f0000000400)=""/134, 0x47, 0x86, 0x1, 0x7ff}, 0x28) (async) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x5204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd56, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) (async) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x13, 0x13, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xcc9}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}, {}, {0x85, 0x0, 0x0, 0x8}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000200)=ANY=[@ANYBLOB="01000000000000000e33aebe05c6c21e85323bfe5bc829f500000000"]) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000010240)=r1, 0x5a) (async) bpf$OBJ_PIN_MAP(0x9, &(0x7f0000000040)=@generic={0x0}, 0x18) perf_event_open(0x0, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) (async) syz_clone(0xc4201100, 0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) 655.901662ms ago: executing program 4 (id=1513): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x205, 0x9442d, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x253, 0x400000, 0x9cb, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x50) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x8e20, 0xa2a}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x87, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x2, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x85, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @perf_bp={0x0, 0xc}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000010000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x5, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r3}, 0x0, 0x0}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x8, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xc57) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x10, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@call={0x85, 0x0, 0x0, 0xa0}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r6, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) close(r0) 544.2193ms ago: executing program 0 (id=1514): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x8, 0x4, 0x4, 0x20012}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r1}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xf, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xac, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x40000000}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r4}, 0xc) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0xd0e4, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffa, 0x4, @perf_bp={0x0, 0x6}, 0x19183, 0x1, 0x5, 0xb, 0xa, 0x904813a5, 0x4, 0x0, 0x0, 0x0, 0xffffffffffff0000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="05000000040000000400000004"], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080)={0x0, r4}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x10, 0x10, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {0x85, 0x0, 0x0, 0x2a}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@ldst={0x2, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4b, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x60100200, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000740)={&(0x7f0000000280)="8c0cb47276d95b2fe1722500ef7f8b3499d68bfac9ce331aa32eea55936bd942a5b3321a11332092992b4dd130de584705401b61de0fe4eb69a84ca706eb7bdaafa0c34f77903001babdc74b4a0ac06c2d945b2971347c5195dfba324b088889d9b33107fd32cfb75841f5caebad87af05aed11eda894c586f67119f2dc9a13578b252dd0e71c4a26cab33020d7d58f3e37d1579", &(0x7f0000000340)=""/61, &(0x7f0000000380)="8d5c509c009bafd6dd586c0a22a930c959f5f6a034ecb03156ffc31a1058ced8aba107cf2eafd36daec34e91803d02afdcf0d00b2a5430376f675fb458ccb9fa090195565fdb385355ff32af7bfd3713fab042947bc9a91ea501d1f96de40b94c89f5e44f2b07aa4f87cf3028e77544b2f99298a5515ec6a12110b08b7ae6f38a75ca76f0da6a10ad600262f", &(0x7f0000000640)="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", 0x8, r0}, 0x38) 481.219531ms ago: executing program 3 (id=1515): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f00000021c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000040)}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r1, 0x0, 0xe, 0x0, &(0x7f0000000300)="14fd54ab72df97e6256c00000000", 0x0, 0xfeff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x6af}, 0x2000, 0x0, 0x0, 0x7, 0x0, 0xb, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x11, 0x4, 0x4, 0x8, 0x800, 0xffffffffffffffff, 0x3}, 0x50) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000b00)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000006000000040000000000000e0400000000000000000000000000000500000000020000000000000802000000000000000000000a0300000000005f0061"], 0x0, 0x52}, 0x28) bpf$ENABLE_STATS(0x20, 0x0, 0x0) getpid() r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xd, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006100000085000000a0000000180100002025642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000089cdc832850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000004c0)="b9ffe2318944268cb89916f086c1", 0x0, 0x78, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x6, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000005"], 0x48) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{r3}, &(0x7f0000000400), &(0x7f0000000500)=r4}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400), 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x6, 0x13, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020200008500000072000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0xfca804a0, 0xd, 0x0, &(0x7f0000000000)="9b352e98d1dc0621a18bc4c5a6", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r0, 0x89a2, &(0x7f0000000040)={'bridge0\x00', @random="0400"}) 384.766106ms ago: executing program 0 (id=1516): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x30, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe33, 0x0, 0x0, 0x0}, 0x40) close(0x3) close(0x4) r1 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x15, 0x2000000000000216, &(0x7f0000000400)=ANY=[@ANYRESHEX=r1], 0x0, 0x6, 0x0, 0x0, 0x41000, 0x1c, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8050, 0x400000, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000100000000000000000000008500000087000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000080)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xe, 0x0, &(0x7f00000003c0)="e097566f5bec64466cf0925782dd", 0x0, 0x8c9, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x100600, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfdd9, 0x0, 0x0, 0x0, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) r6 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r5) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r7, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0xb, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_type(r8, &(0x7f0000000100), 0x2, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x1b) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYBLOB="00000000040000"], 0x48) 376.474618ms ago: executing program 4 (id=1517): bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x2}, 0x38) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f0000000040)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x3d) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0x4, &(0x7f0000000180)=ANY=[@ANYRESHEX=r0], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @cgroup_sock_addr=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 360.32092ms ago: executing program 2 (id=1518): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fffffff, 0x5}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[], 0x48) (async) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) (async) r1 = syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x4, 0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="a60a00000000000061118000000000001800000000000000000000000000000095"], &(0x7f0000000000)='GPL\x00'}, 0x94) (async) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1500000004000000080000400100000000000000", @ANYRES32, @ANYBLOB="040000000000000000000000000000000000000061f54d699494cb9e17b617f9b0110693fd7342fac71301335ef65c7f19189839e80dc6d112c3415ba9beac23d0e1b654de69dce148b842238b43793c30d681481f163464ee215cde51518e9c94c572fd7af07110ca5ef3b211c7b37172bc0587d89ea6684bbccea476fd535ead239f10044c3239111f06d7409bcff0b0c8cee46c657785c228808f448daa4572f6c0f9a9b0b649b9fdab68638eaa21828eed1b9b301d164b314011636ba80a723eaff7b319c6db9dbaf9", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095000000000000007deafafc1b61bf3fd6cad33e3ea8d8280f54f8cd68fb7939ec9e70e1ed10a808f40c25069cde77bd0d896e6ae87e0881c9e564b6dc1a82b38a1a823992a3e62f60d995a3ecf308db0e8e655f8a1e25290c4cc80c6e54762d658adc05095b94e7ebb7ad21d5ef807ac0e24666fab2080e535e4c614807dd5f0a962944615db8be3d214cf82a940e73"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r3}, 0xc) (async) perf_event_open(&(0x7f0000000800)={0x4, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0xc006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0xfff, 0xecc}, 0x0, 0x0, 0x0, 0x9, 0x200000, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x3, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x2) (async) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x0, 0x2, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000034f0e61000000000000000004000000bb7f1a007600feff000020009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f0000000100)=""/147, 0x0, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x94) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001680)={r2, &(0x7f0000001500)="91ab219d", &(0x7f00000015c0)=""/133}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x15, 0x2000000000000216, &(0x7f00000001c0)=ANY=[@ANYRESOCT=0x0], 0x0, 0xffffffff, 0x0, 0x0, 0x41000, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) (async) close(0xffffffffffffffff) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="080935bde916"}) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x2, 0x6, 0x6, 0x9, 0x0, 0x4, 0x47, 0xa, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x108022, 0x3e6, 0x7f, 0x7, 0x6, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x3}, r1, 0xc, r5, 0x10) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 250.080979ms ago: executing program 4 (id=1519): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x3, 0x1, &(0x7f0000000440)=@raw=[@call={0x85, 0x0, 0x0, 0x8f}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000004c0)=r0, 0x4) sendmsg$inet(r2, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000006110080000000000b50000000000000095"], &(0x7f0000000100)='GPL\x00', 0x4, 0xd2, &(0x7f00000002c0)=""/210}, 0x94) 249.069069ms ago: executing program 1 (id=1520): r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xb0000}, 0x805, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c0000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000017000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="18020000040000000000000000000000850000002c000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000380)="b9ff0300600d698cff9e14f092dd", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffff}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0x4, 0x0, &(0x7f00000002c0)="00000002", 0x0, 0xd00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000007000500000080000000000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3a, 0x10, &(0x7f0000000340), 0xd58495bc, 0x0, 0xffffffffffffffff, 0xffffffffffffff5b}, 0x42) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r4, 0x2000012, 0x100e, 0x2, &(0x7f0000000c40)="63eced8e46dc3f2ddf33c9e9b986", 0x0, 0x7ffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 248.246299ms ago: executing program 2 (id=1521): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xa81}, {}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x8, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="1800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x402, 0x1003ff, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000400), 0x401, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000340), 0x0}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x7, 0x5, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000016000100e7ff17e494000000000000000500feff"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x80}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x13}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x3, 0x4, &(0x7f0000000340)=@framed={{0x18, 0x2, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x6f62}, [@call={0x85, 0x0, 0x0, 0x5f}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0xf1, 0x7, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, @perf_config_ext, 0x0, 0x105, 0x0, 0x0, 0x0, 0xffff0000, 0x0, 0x0, 0x102ff, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x5, 0x4, 0x8, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b708000000bc7a007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r2, 0x4) 246.400329ms ago: executing program 0 (id=1522): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r1}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x57) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x702, 0xe, 0x700, &(0x7f0000000540)="e460334470b8d480eb00c15286dd", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_subtree(r0, &(0x7f0000000500)={[{0x2b, 'memory'}, {0x2d, 'io'}, {0x2d, 'net'}, {0x2d, 'io'}, {0x2d, 'rdma'}, {0x2b, 'devices'}, {0x2d, 'rdma'}, {0x2d, 'pids'}]}, 0x30) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x1, 0x0, 0x8, 0xfffffffffffffffe, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000940)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x4, 0xdd, &(0x7f0000000340)=""/221}, 0x94) close(0x3) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r7) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x110e22fff6) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNGETVNETLE(r7, 0x8004745a, &(0x7f0000000180)) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) syz_clone(0x20083500, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) 174.516001ms ago: executing program 3 (id=1523): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xed0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3a, 0x10, &(0x7f0000000340), 0xd58495bc, 0x0, 0xffffffffffffffff, 0xffffffffffffff5b}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r0, 0x2000012, 0x100e, 0x2, &(0x7f0000000c40)="63eced8e46dc3f2ddf33c9e9b986", 0x0, 0x7ffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) (async, rerun: 32) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000180)={0x2, &(0x7f0000000080)=[{0x28, 0x0, 0x35, 0xffff254e}, {0x6, 0xd8, 0xb}]}) (async, rerun: 32) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x67, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, @perf_bp={0x0, 0x9}, 0x8800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"/1901], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d}, 0x94) (rerun: 32) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0xa, [@struct={0x4, 0x1, 0x0, 0x4, 0x0, 0x7, [{0x6, 0x3}]}, @int={0x5, 0x0, 0x0, 0x1, 0x5, 0x20}, @typedef={0x7, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x61, 0x5f, 0x30, 0x61, 0x61, 0x61, 0x2e, 0x5f]}}, 0x0, 0x56}, 0x28) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000e41621eb70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000240)=r0) syz_clone(0x60100200, 0x0, 0x0, 0x0, 0x0, 0x0) 173.392001ms ago: executing program 4 (id=1524): r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x20, &(0x7f0000000700)={&(0x7f0000000540)=""/81, 0x51, 0x0, &(0x7f0000000680)=""/100, 0x64}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0c000000070000000008000002000000000800002f90205740aa101cbf9b783d2ce1eab664934e25de0a0b5be6ec083563a3a579cdda14b7dd6ace89ca95f4a54b05004bb1c9a41454009ea51e7021df11bf052301b49e7887729054b08ec77bdc2d666543378520c612ad0ba223b810", @ANYRES32, @ANYBLOB='\t\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000020000000200"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000a00)=ANY=[@ANYRESHEX, @ANYBLOB="60f4356aaa98eab7552f46aeacbd100e8d9e254bc152978a03731987331888667295e2bb1dc82b38c067b263154d7d0261cc97af6ac4e9d5437bf71337bab7e348c75a472c2ecb8453711323839f367e930a357807a86c9af7a433dbba3b4b496d225666afae9d4e25a835658f2715364e6eb7e758b3f17ad0012b7e9619ccdc3f8accbf10ac389728440ff5170d0783423c40bc0677cc8ff061b7983f", @ANYRES32=r0, @ANYRES8=r1, @ANYRES64=r0], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18069e020000070000008b29632fb76c9e6c00000000000000"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000380)={&(0x7f0000000040)="b64b6779e728a585fc6d831c9c111ee3bf867c7fa20663508d961b5b0bc1d4eded804b84c8ee0b5e7b55af44aa8bf4a16c4d4aaf896a13f650a3b4f737945a9a179a6ceb93adadb8dd841258d0f04b02868cd415ab9bc48b055a8b3f92b143cb16138c216513a045af2101e7e3c507bedee404330f117181", 0x0, 0x0, 0x0, 0x4000}, 0x38) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, &(0x7f0000000040)=""/73}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000080)=0x2000007, 0x12) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0x800}, 0x10, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1b00000000000000000000000100000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000019942a364d58200bf76520000010300000000000003d98dfb1afd"], 0x50) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x89e1, &(0x7f00000005c0)={'bridge_slave_1\x00'}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e0000000400000008"], 0x50) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x401c5820, &(0x7f0000000000)=0x90) ioctl$TUNSETOFFLOAD(r5, 0x80086601, 0x110e22fff8) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000280)={'wg2\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETVNETLE(r5, 0x800454dd, &(0x7f00000001c0)) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 135.982067ms ago: executing program 3 (id=1525): r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x1, &(0x7f0000000040)=@raw=[@ldst={0x0, 0x2, 0x1, 0x1, 0x3, 0xffffffffffffffff, 0xfffffffffffffff0}], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) (async) openat$cgroup_procs(r0, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x1, &(0x7f0000000040)=@raw=[@ldst={0x0, 0x2, 0x1, 0x1, 0x3, 0xffffffffffffffff, 0xfffffffffffffff0}], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) 112.763531ms ago: executing program 2 (id=1526): perf_event_open(&(0x7f0000000680)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa15, 0x8000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa16ae, 0x9, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x2}, 0x90, 0xa4, 0x2, 0x5, 0xa1, 0x9b9b, 0x8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="07000000040000001800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={r1, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@bloom_filter={0x1e, 0x1, 0x0, 0x7789, 0x80, 0x1, 0x7, '\x00', r3, 0xffffffffffffffff, 0x3, 0x4, 0x0, 0x2000000006}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x6, 0x14, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000045000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000050e88500000070000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000002"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r5}, &(0x7f00000002c0), &(0x7f0000000300)=r5}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r5, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r7}, 0x8) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000380)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8, '\x00', r6, r7, 0x4, 0x3, 0x9}, 0x50) 0s ago: executing program 3 (id=1527): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xa, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.54' (ED25519) to the list of known hosts. [ 26.637911][ T28] audit: type=1400 audit(1776083040.097:64): avc: denied { mounton } for pid=274 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.641983][ T274] cgroup: Unknown subsys name 'net' [ 26.661273][ T28] audit: type=1400 audit(1776083040.107:65): avc: denied { mount } for pid=274 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.690735][ T28] audit: type=1400 audit(1776083040.137:66): avc: denied { unmount } for pid=274 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.691062][ T274] cgroup: Unknown subsys name 'devices' [ 26.810940][ T274] cgroup: Unknown subsys name 'hugetlb' [ 26.816745][ T274] cgroup: Unknown subsys name 'rlimit' [ 26.951732][ T28] audit: type=1400 audit(1776083040.417:67): avc: denied { setattr } for pid=274 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.975513][ T28] audit: type=1400 audit(1776083040.417:68): avc: denied { mounton } for pid=274 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 27.000573][ T28] audit: type=1400 audit(1776083040.417:69): avc: denied { mount } for pid=274 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 27.031102][ T276] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 27.040707][ T28] audit: type=1400 audit(1776083040.507:70): avc: denied { relabelto } for pid=276 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 27.066849][ T28] audit: type=1400 audit(1776083040.507:71): avc: denied { write } for pid=276 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 27.105642][ T28] audit: type=1400 audit(1776083040.567:72): avc: denied { read } for pid=274 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 27.131774][ T28] audit: type=1400 audit(1776083040.567:73): avc: denied { open } for pid=274 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 27.132012][ T274] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 27.944671][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.952105][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.959744][ T282] device bridge_slave_0 entered promiscuous mode [ 27.978545][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.985766][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.993722][ T282] device bridge_slave_1 entered promiscuous mode [ 28.024901][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.032158][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.039755][ T284] device bridge_slave_0 entered promiscuous mode [ 28.047902][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.055172][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.062867][ T284] device bridge_slave_1 entered promiscuous mode [ 28.099608][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.106714][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.114694][ T283] device bridge_slave_0 entered promiscuous mode [ 28.138636][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.146157][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.153852][ T283] device bridge_slave_1 entered promiscuous mode [ 28.199849][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.207908][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.215613][ T285] device bridge_slave_0 entered promiscuous mode [ 28.226861][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.234015][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.242151][ T285] device bridge_slave_1 entered promiscuous mode [ 28.304716][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.312035][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.319859][ T286] device bridge_slave_0 entered promiscuous mode [ 28.331766][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.339054][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.347064][ T286] device bridge_slave_1 entered promiscuous mode [ 28.484991][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.492412][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.499806][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.507076][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.534634][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.541849][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.549442][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.556502][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.572660][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.579864][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.587456][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.594915][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.615083][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.622207][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.629539][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.636604][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.649022][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.656158][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.663596][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.670872][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.705842][ T41] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.714260][ T41] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.721897][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.730098][ T41] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.737737][ T41] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.745395][ T41] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.752788][ T41] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.760607][ T41] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.768072][ T41] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.776238][ T41] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.783656][ T41] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.794660][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.802345][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.830752][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.840127][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.848792][ T41] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.855888][ T41] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.863475][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.872343][ T41] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.879723][ T41] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.887513][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.895588][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.904009][ T41] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.911366][ T41] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.919350][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.927846][ T41] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.934976][ T41] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.945088][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 28.953795][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.962362][ T41] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.969548][ T41] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.988245][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 28.996740][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.005071][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 29.013916][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.023120][ T41] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.030255][ T41] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.037783][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 29.046212][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.054350][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 29.062851][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.071093][ T41] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.078321][ T41] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.093476][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 29.102138][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.110705][ T41] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.117749][ T41] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.125437][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 29.133827][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.142256][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 29.150654][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.172592][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 29.181125][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.189462][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 29.197097][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.205138][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 29.214436][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.222746][ T41] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.230049][ T41] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.237785][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 29.246413][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.254798][ T41] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.261887][ T41] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.269530][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 29.277670][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.296056][ T284] device veth0_vlan entered promiscuous mode [ 29.309455][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 29.318321][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.326738][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 29.335434][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.343813][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 29.352419][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.360869][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 29.369352][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.377360][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 29.386452][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.396163][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.403857][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.423150][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.431636][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 29.439996][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.448635][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 29.457091][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.470588][ T285] device veth0_vlan entered promiscuous mode [ 29.483648][ T286] device veth0_vlan entered promiscuous mode [ 29.490698][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.499270][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.506794][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.514682][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.523376][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.531035][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.543592][ T285] device veth1_macvtap entered promiscuous mode [ 29.556726][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.565938][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 29.575287][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.584746][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 29.593476][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.604302][ T284] device veth1_macvtap entered promiscuous mode [ 29.617593][ T282] device veth0_vlan entered promiscuous mode [ 29.634709][ T286] device veth1_macvtap entered promiscuous mode [ 29.642460][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.651197][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 29.659283][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 29.667448][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.676001][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.684791][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.693700][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.702612][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.711695][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 29.720297][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.728822][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.736392][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.759281][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.767665][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.776529][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 29.784821][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.793646][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.801459][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.816951][ T283] device veth0_vlan entered promiscuous mode [ 29.825974][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.826348][ T285] request_module fs-gadgetfs succeeded, but still no fs? [ 29.837424][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.850819][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.859579][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.868350][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.877043][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.890215][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 29.898713][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.917090][ T282] device veth1_macvtap entered promiscuous mode [ 29.939872][ T283] device veth1_macvtap entered promiscuous mode [ 29.960675][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.983677][ T306] device syzkaller0 entered promiscuous mode [ 30.009621][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 30.027958][ C1] hrtimer: interrupt took 34710 ns [ 30.030652][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.048574][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 30.057092][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.066021][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 30.074786][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.115292][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 30.124417][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.240451][ T315] device syzkaller0 entered promiscuous mode [ 30.598858][ T323] bridge0: port 3(gretap0) entered blocking state [ 30.614668][ T323] bridge0: port 3(gretap0) entered disabled state [ 30.667062][ T323] device gretap0 entered promiscuous mode [ 30.681579][ T323] bridge0: port 3(gretap0) entered blocking state [ 30.688399][ T323] bridge0: port 3(gretap0) entered forwarding state [ 30.793973][ T333] device syzkaller0 entered promiscuous mode [ 31.140065][ T335] bridge0: port 3(gretap0) entered blocking state [ 31.159253][ T335] bridge0: port 3(gretap0) entered disabled state [ 31.213025][ T335] device gretap0 entered promiscuous mode [ 31.233377][ T335] bridge0: port 3(gretap0) entered blocking state [ 31.240882][ T335] bridge0: port 3(gretap0) entered forwarding state [ 31.515819][ T351] device syzkaller0 entered promiscuous mode [ 31.889246][ T356] syz.4.19 (356) used greatest stack depth: 21536 bytes left [ 31.972814][ T369] bridge0: port 4(team_slave_1) entered blocking state [ 32.038614][ T369] bridge0: port 4(team_slave_1) entered disabled state [ 32.056818][ T369] device team_slave_1 entered promiscuous mode [ 32.098236][ T373] device team_slave_1 left promiscuous mode [ 32.118207][ T373] bridge0: port 4(team_slave_1) entered disabled state [ 33.451260][ T379] syz.4.25 (379) used greatest stack depth: 21408 bytes left [ 34.008799][ T396] Driver unsupported XDP return value 0 on prog (id 33) dev N/A, expect packet loss! [ 34.110152][ T28] kauditd_printk_skb: 40 callbacks suppressed [ 34.110170][ T28] audit: type=1400 audit(1776083047.567:114): avc: denied { cpu } for pid=395 comm="syz.4.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 34.236519][ T401] device syzkaller0 entered promiscuous mode [ 34.244800][ T28] audit: type=1400 audit(1776083047.607:115): avc: denied { ioctl } for pid=395 comm="syz.4.30" path="socket:[15995]" dev="sockfs" ino=15995 ioctlcmd=0x8922 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 34.751920][ T28] audit: type=1400 audit(1776083048.217:116): avc: denied { tracepoint } for pid=406 comm="syz.4.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 36.578040][ T439] device syzkaller0 entered promiscuous mode [ 37.892346][ T28] audit: type=1400 audit(1776083051.357:117): avc: denied { setopt } for pid=448 comm="syz.2.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 38.426849][ T488] device syzkaller0 entered promiscuous mode [ 38.897119][ T28] audit: type=1400 audit(1776083052.357:118): avc: denied { create } for pid=497 comm="syz.4.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 39.571089][ T509] device syzkaller0 entered promiscuous mode [ 39.776521][ T519] device syzkaller0 entered promiscuous mode [ 41.523142][ T577] FAULT_INJECTION: forcing a failure. [ 41.523142][ T577] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 41.550423][ T577] CPU: 0 PID: 577 Comm: syz.0.93 Not tainted syzkaller #0 [ 41.557883][ T577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 41.568178][ T577] Call Trace: [ 41.571494][ T577] [ 41.574530][ T577] __dump_stack+0x21/0x24 [ 41.579026][ T577] dump_stack_lvl+0x110/0x170 [ 41.583773][ T577] ? __cfi_dump_stack_lvl+0x8/0x8 [ 41.588883][ T577] dump_stack+0x15/0x24 [ 41.593138][ T577] should_fail_ex+0x3d4/0x520 [ 41.597954][ T577] should_fail+0xb/0x10 [ 41.602152][ T577] should_fail_usercopy+0x1a/0x20 [ 41.607325][ T577] _copy_to_user+0x1e/0x90 [ 41.611906][ T577] simple_read_from_buffer+0xe9/0x160 [ 41.617408][ T577] proc_fail_nth_read+0x1a6/0x220 [ 41.622480][ T577] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 41.628051][ T577] ? security_file_permission+0x94/0xb0 [ 41.633623][ T577] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 41.639281][ T577] vfs_read+0x27a/0x910 [ 41.643572][ T577] ? __cfi_vfs_read+0x10/0x10 [ 41.648458][ T577] ? __kasan_check_write+0x14/0x20 [ 41.653595][ T577] ? mutex_lock+0x93/0x1b0 [ 41.658228][ T577] ? __cfi_mutex_lock+0x10/0x10 [ 41.663217][ T577] ? __fdget_pos+0x2cd/0x380 [ 41.667857][ T577] ? ksys_read+0x71/0x250 [ 41.672248][ T577] ksys_read+0x149/0x250 [ 41.676601][ T577] ? __cfi_ksys_read+0x10/0x10 [ 41.681402][ T577] ? debug_smp_processor_id+0x17/0x20 [ 41.686815][ T577] __x64_sys_read+0x7b/0x90 [ 41.691423][ T577] x64_sys_call+0x2f/0x9a0 [ 41.695892][ T577] do_syscall_64+0x4c/0xa0 [ 41.700352][ T577] ? clear_bhb_loop+0x30/0x80 [ 41.705323][ T577] ? clear_bhb_loop+0x30/0x80 [ 41.710658][ T577] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 41.716888][ T577] RIP: 0033:0x7f6abc75d04e [ 41.721861][ T577] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 41.741661][ T577] RSP: 002b:00007f6abd61efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 41.750453][ T577] RAX: ffffffffffffffda RBX: 00007f6abd61f6c0 RCX: 00007f6abc75d04e [ 41.758533][ T577] RDX: 000000000000000f RSI: 00007f6abd61f0a0 RDI: 0000000000000006 [ 41.766622][ T577] RBP: 00007f6abd61f090 R08: 0000000000000000 R09: 0000000000000000 [ 41.774698][ T577] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 41.782782][ T577] R13: 00007f6abca16038 R14: 00007f6abca15fa0 R15: 00007fff358b5298 [ 41.791316][ T577] [ 42.038106][ T579] device team_slave_0 entered promiscuous mode [ 42.089449][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 42.113540][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 42.423127][ T601] device syzkaller0 entered promiscuous mode [ 43.393013][ T617] device syzkaller0 entered promiscuous mode [ 43.732029][ T634] bridge0: port 3(gretap0) entered blocking state [ 43.751165][ T634] bridge0: port 3(gretap0) entered disabled state [ 43.814135][ T634] device gretap0 entered promiscuous mode [ 43.855669][ T634] bridge0: port 3(gretap0) entered blocking state [ 43.862680][ T634] bridge0: port 3(gretap0) entered forwarding state [ 43.894956][ T637] bridge0: port 3(gretap0) entered blocking state [ 43.904794][ T637] bridge0: port 3(gretap0) entered disabled state [ 43.963169][ T637] device gretap0 entered promiscuous mode [ 43.985299][ T637] bridge0: port 3(gretap0) entered blocking state [ 43.992605][ T637] bridge0: port 3(gretap0) entered forwarding state [ 44.663527][ T666] device syzkaller0 entered promiscuous mode [ 44.839816][ T671] device syzkaller0 entered promiscuous mode [ 45.132852][ T28] audit: type=1400 audit(1776083058.597:119): avc: denied { create } for pid=683 comm="syz.2.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 45.969264][ T713] device syzkaller0 entered promiscuous mode [ 46.273001][ T730] device syzkaller0 entered promiscuous mode [ 46.521715][ T740] device syzkaller0 entered promiscuous mode [ 47.232763][ T766] bridge0: port 3(gretap0) entered blocking state [ 47.243384][ T766] bridge0: port 3(gretap0) entered disabled state [ 47.295052][ T766] device gretap0 entered promiscuous mode [ 47.315713][ T766] bridge0: port 3(gretap0) entered blocking state [ 47.322468][ T766] bridge0: port 3(gretap0) entered forwarding state [ 47.842568][ T792] device syzkaller0 entered promiscuous mode [ 48.382778][ T812] device syzkaller0 entered promiscuous mode [ 48.676792][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 48.903876][ T833] device syzkaller0 entered promiscuous mode [ 49.302181][ T846] device veth0_vlan left promiscuous mode [ 49.499868][ T846] device veth0_vlan entered promiscuous mode [ 49.669019][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 49.686421][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 49.713367][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 49.808864][ T863] device sit0 entered promiscuous mode [ 50.655057][ T896] device syzkaller0 left promiscuous mode [ 52.103935][ T28] audit: type=1400 audit(1776083065.567:120): avc: denied { create } for pid=930 comm="syz.4.214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 52.173352][ T928] device syzkaller0 entered promiscuous mode [ 52.314587][ T927] device syzkaller0 entered promiscuous mode [ 53.754042][ T981] device syzkaller0 entered promiscuous mode [ 53.780721][ T981] FAULT_INJECTION: forcing a failure. [ 53.780721][ T981] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 53.809500][ T981] CPU: 1 PID: 981 Comm: syz.1.227 Not tainted syzkaller #0 [ 53.816862][ T981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 53.827046][ T981] Call Trace: [ 53.830388][ T981] [ 53.833375][ T981] __dump_stack+0x21/0x24 [ 53.837935][ T981] dump_stack_lvl+0x110/0x170 [ 53.842662][ T981] ? __cfi_dump_stack_lvl+0x8/0x8 [ 53.847733][ T981] dump_stack+0x15/0x24 [ 53.851937][ T981] should_fail_ex+0x3d4/0x520 [ 53.856760][ T981] should_fail+0xb/0x10 [ 53.860959][ T981] should_fail_usercopy+0x1a/0x20 [ 53.866037][ T981] _copy_from_iter+0x196/0x1010 [ 53.870928][ T981] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 53.877127][ T981] ? __cfi__copy_from_iter+0x10/0x10 [ 53.882459][ T981] ? stack_trace_save+0xa6/0xf0 [ 53.887536][ T981] ? __stack_depot_save+0x36/0x480 [ 53.893094][ T981] tun_get_user+0x424/0x3470 [ 53.897819][ T981] ? _parse_integer+0x2a/0x40 [ 53.902550][ T981] ? tun_do_read+0x1cf0/0x1cf0 [ 53.907446][ T981] ? __kasan_check_write+0x14/0x20 [ 53.912593][ T981] ? ref_tracker_alloc+0x31d/0x4a0 [ 53.918283][ T981] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 53.923907][ T981] ? avc_policy_seqno+0x1b/0x70 [ 53.928895][ T981] ? selinux_file_permission+0x2a5/0x510 [ 53.934580][ T981] tun_chr_write_iter+0x1fb/0x300 [ 53.939744][ T981] vfs_write+0x603/0xce0 [ 53.944051][ T981] ? __cfi_vfs_write+0x10/0x10 [ 53.948866][ T981] ? __fget_files+0x2d5/0x330 [ 53.953620][ T981] ? __fdget_pos+0x1f2/0x380 [ 53.958288][ T981] ? ksys_write+0x71/0x250 [ 53.962788][ T981] ksys_write+0x149/0x250 [ 53.967158][ T981] ? __cfi_ksys_write+0x10/0x10 [ 53.972050][ T981] ? debug_smp_processor_id+0x17/0x20 [ 53.977495][ T981] __x64_sys_write+0x7b/0x90 [ 53.982131][ T981] x64_sys_call+0x27b/0x9a0 [ 53.986770][ T981] do_syscall_64+0x4c/0xa0 [ 53.991231][ T981] ? clear_bhb_loop+0x30/0x80 [ 53.996098][ T981] ? clear_bhb_loop+0x30/0x80 [ 54.000953][ T981] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 54.006987][ T981] RIP: 0033:0x7f07fd59c819 [ 54.011531][ T981] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 54.031677][ T981] RSP: 002b:00007f07fe522028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 54.040191][ T981] RAX: ffffffffffffffda RBX: 00007f07fd815fa0 RCX: 00007f07fd59c819 [ 54.048339][ T981] RDX: 000000000000ffdd RSI: 00002000000000c0 RDI: 0000000000000006 [ 54.056525][ T981] RBP: 00007f07fe522090 R08: 0000000000000000 R09: 0000000000000000 [ 54.064804][ T981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 54.072994][ T981] R13: 00007f07fd816038 R14: 00007f07fd815fa0 R15: 00007ffd43db2978 [ 54.081012][ T981] [ 54.401923][ T986] device syzkaller0 entered promiscuous mode [ 55.380278][ T1018] device syzkaller0 entered promiscuous mode [ 55.466754][ T1018] FAULT_INJECTION: forcing a failure. [ 55.466754][ T1018] name failslab, interval 1, probability 0, space 0, times 1 [ 55.481026][ T1018] CPU: 1 PID: 1018 Comm: syz.3.240 Not tainted syzkaller #0 [ 55.488377][ T1018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 55.498480][ T1018] Call Trace: [ 55.501791][ T1018] [ 55.504752][ T1018] __dump_stack+0x21/0x24 [ 55.509125][ T1018] dump_stack_lvl+0x110/0x170 [ 55.513935][ T1018] ? __cfi_dump_stack_lvl+0x8/0x8 [ 55.519177][ T1018] ? __kasan_check_write+0x14/0x20 [ 55.524359][ T1018] dump_stack+0x15/0x24 [ 55.528561][ T1018] should_fail_ex+0x3d4/0x520 [ 55.533403][ T1018] __should_failslab+0xac/0xf0 [ 55.538201][ T1018] should_failslab+0x9/0x20 [ 55.542836][ T1018] kmem_cache_alloc_node+0x42/0x340 [ 55.548171][ T1018] ? __alloc_skb+0xea/0x4b0 [ 55.552921][ T1018] __alloc_skb+0xea/0x4b0 [ 55.557293][ T1018] alloc_skb_with_frags+0xa8/0x620 [ 55.562529][ T1018] ? 0xffffffffa0003dd8 [ 55.566889][ T1018] sock_alloc_send_pskb+0x87f/0x9a0 [ 55.572124][ T1018] ? __cfi_sock_alloc_send_pskb+0x10/0x10 [ 55.577970][ T1018] ? stack_trace_save+0xa6/0xf0 [ 55.583105][ T1018] ? iov_iter_advance+0x98/0x1b0 [ 55.588127][ T1018] tun_get_user+0xa63/0x3470 [ 55.592773][ T1018] ? _parse_integer+0x2a/0x40 [ 55.597758][ T1018] ? tun_do_read+0x1cf0/0x1cf0 [ 55.602622][ T1018] ? __kasan_check_write+0x14/0x20 [ 55.607901][ T1018] ? ref_tracker_alloc+0x31d/0x4a0 [ 55.613057][ T1018] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 55.618568][ T1018] ? avc_policy_seqno+0x1b/0x70 [ 55.623552][ T1018] ? selinux_file_permission+0x2a5/0x510 [ 55.629226][ T1018] tun_chr_write_iter+0x1fb/0x300 [ 55.634297][ T1018] vfs_write+0x603/0xce0 [ 55.638640][ T1018] ? __cfi_vfs_write+0x10/0x10 [ 55.643523][ T1018] ? __fget_files+0x2d5/0x330 [ 55.648316][ T1018] ? __fdget_pos+0x1f2/0x380 [ 55.653117][ T1018] ? ksys_write+0x71/0x250 [ 55.657567][ T1018] ksys_write+0x149/0x250 [ 55.661957][ T1018] ? __cfi_ksys_write+0x10/0x10 [ 55.666856][ T1018] ? debug_smp_processor_id+0x17/0x20 [ 55.672442][ T1018] __x64_sys_write+0x7b/0x90 [ 55.677075][ T1018] x64_sys_call+0x27b/0x9a0 [ 55.681713][ T1018] do_syscall_64+0x4c/0xa0 [ 55.686177][ T1018] ? clear_bhb_loop+0x30/0x80 [ 55.690893][ T1018] ? clear_bhb_loop+0x30/0x80 [ 55.695611][ T1018] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 55.701541][ T1018] RIP: 0033:0x7fddb9b9c819 [ 55.705994][ T1018] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 55.725813][ T1018] RSP: 002b:00007fddbaa6b028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 55.734351][ T1018] RAX: ffffffffffffffda RBX: 00007fddb9e15fa0 RCX: 00007fddb9b9c819 [ 55.742345][ T1018] RDX: 000000000000ffdd RSI: 00002000000000c0 RDI: 0000000000000006 [ 55.750357][ T1018] RBP: 00007fddbaa6b090 R08: 0000000000000000 R09: 0000000000000000 [ 55.758354][ T1018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 55.766342][ T1018] R13: 00007fddb9e16038 R14: 00007fddb9e15fa0 R15: 00007ffeb203f248 [ 55.774345][ T1018] [ 55.890268][ T1026] device syzkaller0 entered promiscuous mode [ 56.114084][ T1030] device syzkaller0 entered promiscuous mode [ 56.188933][ T1034] device syzkaller0 entered promiscuous mode [ 56.365840][ T1048] device syzkaller0 entered promiscuous mode [ 56.482295][ T1055] device syzkaller0 entered promiscuous mode [ 56.794366][ T1077] device syzkaller0 entered promiscuous mode [ 57.367965][ T28] audit: type=1400 audit(1776083070.827:121): avc: denied { create } for pid=1090 comm="syz.2.268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 57.664757][ T1103] device syzkaller0 entered promiscuous mode [ 57.710451][ T1103] FAULT_INJECTION: forcing a failure. [ 57.710451][ T1103] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 57.735077][ T1103] CPU: 0 PID: 1103 Comm: syz.1.273 Not tainted syzkaller #0 [ 57.742527][ T1103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 57.752677][ T1103] Call Trace: [ 57.755995][ T1103] [ 57.758955][ T1103] __dump_stack+0x21/0x24 [ 57.763334][ T1103] dump_stack_lvl+0x110/0x170 [ 57.768059][ T1103] ? __cfi_dump_stack_lvl+0x8/0x8 [ 57.773128][ T1103] ? kasan_set_track+0x60/0x70 [ 57.777918][ T1103] ? kasan_save_alloc_info+0x25/0x30 [ 57.783329][ T1103] ? __kasan_kmalloc+0x95/0xb0 [ 57.788158][ T1103] ? __kmalloc_node_track_caller+0xb1/0x1e0 [ 57.794080][ T1103] ? alloc_skb_with_frags+0xa8/0x620 [ 57.799394][ T1103] ? sock_alloc_send_pskb+0x87f/0x9a0 [ 57.804959][ T1103] ? tun_get_user+0xa63/0x3470 [ 57.809747][ T1103] dump_stack+0x15/0x24 [ 57.813942][ T1103] should_fail_ex+0x3d4/0x520 [ 57.818746][ T1103] should_fail_alloc_page+0x61/0x90 [ 57.823969][ T1103] prepare_alloc_pages+0x148/0x600 [ 57.829107][ T1103] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 57.834423][ T1103] __alloc_pages+0x15b/0x610 [ 57.839045][ T1103] ? __cfi___alloc_pages+0x10/0x10 [ 57.844376][ T1103] ? __kasan_check_write+0x14/0x20 [ 57.849518][ T1103] ? __build_skb_around+0x24f/0x470 [ 57.854759][ T1103] ? __alloc_skb+0x2df/0x4b0 [ 57.859375][ T1103] alloc_skb_with_frags+0x20c/0x620 [ 57.864625][ T1103] sock_alloc_send_pskb+0x87f/0x9a0 [ 57.869842][ T1103] ? __cfi_sock_alloc_send_pskb+0x10/0x10 [ 57.875619][ T1103] ? stack_trace_save+0xa6/0xf0 [ 57.880509][ T1103] ? iov_iter_advance+0x98/0x1b0 [ 57.885477][ T1103] tun_get_user+0xa63/0x3470 [ 57.890350][ T1103] ? _parse_integer+0x2a/0x40 [ 57.895063][ T1103] ? tun_do_read+0x1cf0/0x1cf0 [ 57.899937][ T1103] ? __kasan_check_write+0x14/0x20 [ 57.905176][ T1103] ? ref_tracker_alloc+0x31d/0x4a0 [ 57.910343][ T1103] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 57.915919][ T1103] ? avc_policy_seqno+0x1b/0x70 [ 57.920807][ T1103] ? selinux_file_permission+0x2a5/0x510 [ 57.926559][ T1103] tun_chr_write_iter+0x1fb/0x300 [ 57.931612][ T1103] vfs_write+0x603/0xce0 [ 57.935880][ T1103] ? __cfi_vfs_write+0x10/0x10 [ 57.940668][ T1103] ? __fget_files+0x2d5/0x330 [ 57.945480][ T1103] ? __fdget_pos+0x1f2/0x380 [ 57.950104][ T1103] ? ksys_write+0x71/0x250 [ 57.954657][ T1103] ksys_write+0x149/0x250 [ 57.959294][ T1103] ? __cfi_ksys_write+0x10/0x10 [ 57.964199][ T1103] ? debug_smp_processor_id+0x17/0x20 [ 57.969876][ T1103] __x64_sys_write+0x7b/0x90 [ 57.974498][ T1103] x64_sys_call+0x27b/0x9a0 [ 57.979720][ T1103] do_syscall_64+0x4c/0xa0 [ 57.984263][ T1103] ? clear_bhb_loop+0x30/0x80 [ 57.989343][ T1103] ? clear_bhb_loop+0x30/0x80 [ 57.994065][ T1103] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 57.999977][ T1103] RIP: 0033:0x7f07fd59c819 [ 58.004499][ T1103] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 58.024520][ T1103] RSP: 002b:00007f07fe522028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 58.033240][ T1103] RAX: ffffffffffffffda RBX: 00007f07fd815fa0 RCX: 00007f07fd59c819 [ 58.041360][ T1103] RDX: 000000000000ffdd RSI: 00002000000000c0 RDI: 0000000000000006 [ 58.049552][ T1103] RBP: 00007f07fe522090 R08: 0000000000000000 R09: 0000000000000000 [ 58.057928][ T1103] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 58.066048][ T1103] R13: 00007f07fd816038 R14: 00007f07fd815fa0 R15: 00007ffd43db2978 [ 58.075995][ T1103] [ 58.325673][ T1127] device syzkaller0 entered promiscuous mode [ 58.376911][ T1128] device syzkaller0 entered promiscuous mode [ 58.582872][ T1146] device syzkaller0 entered promiscuous mode [ 58.613904][ T1153] device syzkaller0 entered promiscuous mode [ 59.222500][ T1180] device syzkaller0 entered promiscuous mode [ 59.293342][ T1181] device syzkaller0 entered promiscuous mode [ 59.483863][ T1191] device syzkaller0 entered promiscuous mode [ 60.365037][ T28] audit: type=1400 audit(1776083073.827:122): avc: denied { write } for pid=1224 comm="syz.1.314" name="cgroup.subtree_control" dev="cgroup2" ino=295 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 60.533137][ T28] audit: type=1400 audit(1776083073.857:123): avc: denied { open } for pid=1224 comm="syz.1.314" path="" dev="cgroup2" ino=295 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 60.668162][ T28] audit: type=1400 audit(1776083073.857:124): avc: denied { ioctl } for pid=1224 comm="syz.1.314" path="" dev="cgroup2" ino=295 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 60.961817][ T1263] device syzkaller0 entered promiscuous mode [ 61.149956][ T1266] device syzkaller0 entered promiscuous mode [ 63.337929][ C1] sched: RT throttling activated [ 63.337929][ C0] sched: RT throttling activated [ 63.535534][ T1306] device syzkaller0 entered promiscuous mode [ 63.787148][ T1318] device syzkaller0 entered promiscuous mode [ 63.931128][ T28] audit: type=1400 audit(1776083077.397:125): avc: denied { create } for pid=1323 comm="syz.0.348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 64.034908][ T1330] device syzkaller0 entered promiscuous mode [ 64.456841][ T1357] device syzkaller0 entered promiscuous mode [ 64.591373][ T1367] device syzkaller0 entered promiscuous mode [ 64.933593][ T1381] device syzkaller0 entered promiscuous mode [ 65.447221][ T1401] device syzkaller0 entered promiscuous mode [ 65.500521][ T1409] device syzkaller0 entered promiscuous mode [ 65.794093][ T1427] device syzkaller0 entered promiscuous mode [ 66.009542][ T1441] device syzkaller0 entered promiscuous mode [ 66.082427][ T1449] device syzkaller0 entered promiscuous mode [ 66.288448][ T1480] pimreg: tun_chr_ioctl cmd 1074025681 [ 66.537354][ T1495] device syzkaller0 entered promiscuous mode [ 66.677823][ T1506] device syzkaller0 entered promiscuous mode [ 67.141527][ T1548] device veth1_macvtap left promiscuous mode [ 67.179144][ T1548] device macsec0 entered promiscuous mode [ 67.244215][ T1558] device syzkaller0 entered promiscuous mode [ 68.007318][ T1606] device syzkaller0 entered promiscuous mode [ 68.046772][ T1607] device lo entered promiscuous mode [ 68.173892][ T1605] device lo left promiscuous mode [ 68.985727][ T1637] device syzkaller0 entered promiscuous mode [ 69.401033][ T1663] device syzkaller0 entered promiscuous mode [ 69.719059][ T1683] device syzkaller0 entered promiscuous mode [ 70.255946][ T1705] device syzkaller0 entered promiscuous mode [ 70.471365][ T1708] device syzkaller0 entered promiscuous mode [ 71.012259][ T1732] tap0: tun_chr_ioctl cmd 1074025680 [ 71.253768][ T1743] device syzkaller0 entered promiscuous mode [ 72.008074][ T1782] device syzkaller0 entered promiscuous mode [ 72.488433][ T1806] device syzkaller0 left promiscuous mode [ 73.148114][ T1820] device syzkaller0 entered promiscuous mode [ 73.352206][ T1825] device syzkaller0 entered promiscuous mode [ 74.389472][ T1841] device syzkaller0 entered promiscuous mode [ 74.529745][ T1848] device syzkaller0 entered promiscuous mode [ 75.621436][ T1870] device syzkaller0 entered promiscuous mode [ 75.871518][ T1878] device syzkaller0 entered promiscuous mode [ 77.078393][ T1917] device syzkaller0 entered promiscuous mode [ 77.198438][ T1927] device syzkaller0 entered promiscuous mode [ 78.241004][ T1959] device syzkaller0 entered promiscuous mode [ 78.670217][ T1966] device team_slave_0 entered promiscuous mode [ 78.740439][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 78.757146][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 79.397827][ T1990] device syzkaller0 entered promiscuous mode [ 80.016303][ T2014] device syzkaller0 left promiscuous mode [ 80.721005][ T2037] device syzkaller0 entered promiscuous mode [ 80.981290][ T2043] device syzkaller0 entered promiscuous mode [ 81.103079][ T2055] device syzkaller0 entered promiscuous mode [ 82.405940][ T2104] device syzkaller0 entered promiscuous mode [ 83.140289][ T2139] device veth0_vlan left promiscuous mode [ 83.163624][ T2139] device veth0_vlan entered promiscuous mode [ 83.443248][ T2139] device sit0 entered promiscuous mode [ 84.025992][ T2157] device syzkaller0 entered promiscuous mode [ 85.003509][ T2187] device syzkaller0 left promiscuous mode [ 85.058456][ T2192] device syzkaller0 entered promiscuous mode [ 85.289883][ T2199] device syzkaller0 entered promiscuous mode [ 86.335730][ T2227] device syzkaller0 entered promiscuous mode [ 86.894046][ T2237] device syzkaller0 entered promiscuous mode [ 87.593014][ T2250] device syzkaller0 entered promiscuous mode [ 87.596353][ T2253] syzkaller0: create flow: hash 2481852505 index 0 [ 87.728076][ T2250] syzkaller0 (unregistered): delete flow: hash 2481852505 index 0 [ 87.827286][ T2257] device syzkaller0 entered promiscuous mode [ 87.926522][ T2264] device syzkaller0 entered promiscuous mode [ 88.121548][ T2273] device syzkaller0 entered promiscuous mode [ 89.138735][ T2299] device syzkaller0 entered promiscuous mode [ 89.335531][ T2304] device syzkaller0 entered promiscuous mode [ 89.655700][ T28] audit: type=1400 audit(1776083103.117:126): avc: denied { create } for pid=2321 comm="syz.4.706" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 89.972344][ T2342] device syzkaller0 entered promiscuous mode [ 89.982156][ T2339] bridge0: port 4(team_slave_1) entered blocking state [ 90.028114][ T2339] bridge0: port 4(team_slave_1) entered disabled state [ 90.046104][ T2339] device team_slave_1 entered promiscuous mode [ 90.169603][ T2358] device syzkaller0 entered promiscuous mode [ 90.311950][ T28] audit: type=1400 audit(1776083103.777:127): avc: denied { create } for pid=2363 comm="syz.0.721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 91.493515][ T28] audit: type=1400 audit(1776083104.957:128): avc: denied { create } for pid=2370 comm="syz.3.723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 91.540101][ T2369] device syzkaller0 entered promiscuous mode [ 91.917694][ T2390] device syzkaller0 entered promiscuous mode [ 92.101268][ T2396] device syzkaller0 entered promiscuous mode [ 92.139268][ T2397] FAULT_INJECTION: forcing a failure. [ 92.139268][ T2397] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 92.153336][ T2397] CPU: 0 PID: 2397 Comm: syz.1.732 Not tainted syzkaller #0 [ 92.160770][ T2397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 92.170977][ T2397] Call Trace: [ 92.174374][ T2397] [ 92.177351][ T2397] __dump_stack+0x21/0x24 [ 92.181911][ T2397] dump_stack_lvl+0x110/0x170 [ 92.186799][ T2397] ? __cfi_dump_stack_lvl+0x8/0x8 [ 92.191891][ T2397] dump_stack+0x15/0x24 [ 92.196072][ T2397] should_fail_ex+0x3d4/0x520 [ 92.200793][ T2397] should_fail+0xb/0x10 [ 92.205323][ T2397] should_fail_usercopy+0x1a/0x20 [ 92.210382][ T2397] _copy_from_user+0x1e/0xc0 [ 92.215106][ T2397] __sys_bpf+0x2a0/0x850 [ 92.219475][ T2397] ? bpf_link_show_fdinfo+0x330/0x330 [ 92.225143][ T2397] ? irqentry_exit+0x37/0x40 [ 92.230038][ T2397] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 92.236066][ T2397] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 92.242395][ T2397] __x64_sys_bpf+0x7c/0x90 [ 92.246942][ T2397] x64_sys_call+0x488/0x9a0 [ 92.251477][ T2397] do_syscall_64+0x4c/0xa0 [ 92.255944][ T2397] ? clear_bhb_loop+0x30/0x80 [ 92.260678][ T2397] ? clear_bhb_loop+0x30/0x80 [ 92.265385][ T2397] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 92.271441][ T2397] RIP: 0033:0x7f07fd59c819 [ 92.275877][ T2397] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 92.295940][ T2397] RSP: 002b:00007f07fe501028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 92.304849][ T2397] RAX: ffffffffffffffda RBX: 00007f07fd816090 RCX: 00007f07fd59c819 [ 92.313204][ T2397] RDX: 0000000000000048 RSI: 0000200000000800 RDI: 0000000000000000 [ 92.321384][ T2397] RBP: 00007f07fe501090 R08: 0000000000000000 R09: 0000000000000000 [ 92.329735][ T2397] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 92.337849][ T2397] R13: 00007f07fd816128 R14: 00007f07fd816090 R15: 00007ffd43db2978 [ 92.345852][ T2397] [ 92.688375][ T2411] device syzkaller0 entered promiscuous mode [ 92.917847][ T2401] bpf setsockopt: ignoring program buffer with optlen=65463 (max_optlen=4096) [ 93.281577][ T2428] device syzkaller0 entered promiscuous mode [ 93.376605][ T2438] device syzkaller0 entered promiscuous mode [ 93.627050][ T2449] bridge0: port 4(team_slave_1) entered blocking state [ 93.699218][ T2449] bridge0: port 4(team_slave_1) entered disabled state [ 93.729164][ T2449] device team_slave_1 entered promiscuous mode [ 93.979671][ T2458] bridge0: port 3(gretap0) entered disabled state [ 93.986395][ T2458] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.993696][ T2458] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.148168][ T2464] device syzkaller0 entered promiscuous mode [ 94.872557][ T2485] device syzkaller0 entered promiscuous mode [ 95.739496][ T2521] device syzkaller0 entered promiscuous mode [ 96.118680][ T2532] ±ÿ: renamed from team_slave_1 [ 96.343138][ T2537] device syzkaller0 entered promiscuous mode [ 98.215001][ T2599] device syzkaller0 entered promiscuous mode [ 98.882149][ T28] audit: type=1400 audit(1776083112.347:129): avc: denied { create } for pid=2613 comm="syz.4.804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 99.322130][ T28] audit: type=1400 audit(1776083112.787:130): avc: denied { create } for pid=2635 comm="syz.0.812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 99.474106][ T2639] device syzkaller0 entered promiscuous mode [ 99.934563][ T2658] device syzkaller0 entered promiscuous mode [ 100.986308][ T2695] device syzkaller0 entered promiscuous mode [ 101.172668][ T2697] device syzkaller0 entered promiscuous mode [ 101.905375][ T2718] device syzkaller0 entered promiscuous mode [ 102.357236][ T2731] device veth0_vlan left promiscuous mode [ 102.381566][ T2731] device veth0_vlan entered promiscuous mode [ 102.558994][ T2731] device sit0 entered promiscuous mode [ 102.729900][ T2740] device syzkaller0 entered promiscuous mode [ 103.437438][ T2767] device syzkaller0 entered promiscuous mode [ 103.594661][ T2776] device syzkaller0 entered promiscuous mode [ 104.072674][ T2792] device syzkaller0 entered promiscuous mode [ 104.119289][ T2795] device syzkaller0 entered promiscuous mode [ 104.402011][ T2801] device wg2 entered promiscuous mode [ 105.266653][ T28] audit: type=1400 audit(1776083118.727:131): avc: denied { create } for pid=2812 comm="syz.0.870" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 105.395721][ T2816] device macsec0 entered promiscuous mode [ 106.051560][ T2830] device syzkaller0 entered promiscuous mode [ 106.092470][ T2831] device sit0 entered promiscuous mode [ 106.433875][ T2838] device syzkaller0 entered promiscuous mode [ 106.592309][ T2843] device team_slave_1 left promiscuous mode [ 106.605497][ T2843] bridge0: port 4(team_slave_1) entered disabled state [ 106.647750][ T2845] FAULT_INJECTION: forcing a failure. [ 106.647750][ T2845] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 106.688535][ T2845] CPU: 0 PID: 2845 Comm: syz.3.881 Not tainted syzkaller #0 [ 106.696511][ T2845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 106.706795][ T2845] Call Trace: [ 106.710618][ T2845] [ 106.713596][ T2845] __dump_stack+0x21/0x24 [ 106.717988][ T2845] dump_stack_lvl+0x110/0x170 [ 106.722978][ T2845] ? __cfi_dump_stack_lvl+0x8/0x8 [ 106.728224][ T2845] ? do_vfs_ioctl+0x1b6c/0x1cd0 [ 106.733248][ T2845] ? __ia32_compat_sys_ioctl+0x860/0x860 [ 106.739023][ T2845] dump_stack+0x15/0x24 [ 106.743325][ T2845] should_fail_ex+0x3d4/0x520 [ 106.748232][ T2845] should_fail+0xb/0x10 [ 106.752536][ T2845] should_fail_usercopy+0x1a/0x20 [ 106.757616][ T2845] _copy_from_user+0x1e/0xc0 [ 106.762367][ T2845] get_user_ifreq+0x6c/0x180 [ 106.767066][ T2845] br_ioctl_stub+0x16d/0xb70 [ 106.771709][ T2845] ? __cfi_br_ioctl_stub+0x10/0x10 [ 106.777139][ T2845] ? has_cap_mac_admin+0x370/0x370 [ 106.782314][ T2845] ? __kasan_check_write+0x14/0x20 [ 106.787668][ T2845] ? mutex_lock+0x93/0x1b0 [ 106.792226][ T2845] ? __cfi_mutex_lock+0x10/0x10 [ 106.797130][ T2845] ? selinux_file_ioctl+0x3a0/0x4d0 [ 106.802392][ T2845] ? __cfi_br_ioctl_stub+0x10/0x10 [ 106.807559][ T2845] sock_ioctl+0x47f/0x710 [ 106.812067][ T2845] ? __cfi_sock_ioctl+0x10/0x10 [ 106.817047][ T2845] ? __fget_files+0x2d5/0x330 [ 106.821762][ T2845] ? security_file_ioctl+0x95/0xc0 [ 106.827013][ T2845] ? __cfi_sock_ioctl+0x10/0x10 [ 106.831910][ T2845] __se_sys_ioctl+0x12f/0x1b0 [ 106.834961][ T2847] device syzkaller0 entered promiscuous mode [ 106.836627][ T2845] __x64_sys_ioctl+0x7b/0x90 [ 106.836654][ T2845] x64_sys_call+0x58b/0x9a0 [ 106.851909][ T2845] do_syscall_64+0x4c/0xa0 [ 106.856373][ T2845] ? clear_bhb_loop+0x30/0x80 [ 106.861098][ T2845] ? clear_bhb_loop+0x30/0x80 [ 106.865815][ T2845] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 106.871753][ T2845] RIP: 0033:0x7fddb9b9c819 [ 106.876203][ T2845] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 106.895859][ T2845] RSP: 002b:00007fddbaa6b028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 106.904503][ T2845] RAX: ffffffffffffffda RBX: 00007fddb9e15fa0 RCX: 00007fddb9b9c819 [ 106.912702][ T2845] RDX: 0000200000000080 RSI: 00000000000089a3 RDI: 0000000000000004 [ 106.920965][ T2845] RBP: 00007fddbaa6b090 R08: 0000000000000000 R09: 0000000000000000 [ 106.928952][ T2845] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 106.936938][ T2845] R13: 00007fddb9e16038 R14: 00007fddb9e15fa0 R15: 00007ffeb203f248 [ 106.946166][ T2845] [ 107.268147][ T28] audit: type=1400 audit(1776083120.727:132): avc: denied { attach_queue } for pid=2857 comm="syz.0.887" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 107.499806][ T2865] device syzkaller0 entered promiscuous mode [ 107.715812][ T2879] device sit0 left promiscuous mode [ 107.846153][ T2879] device sit0 entered promiscuous mode [ 108.509408][ T2919] device syzkaller0 entered promiscuous mode [ 109.102103][ T2948] FAULT_INJECTION: forcing a failure. [ 109.102103][ T2948] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 109.118205][ T2948] CPU: 0 PID: 2948 Comm: syz.0.922 Not tainted syzkaller #0 [ 109.125550][ T2948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 109.135779][ T2948] Call Trace: [ 109.139190][ T2948] [ 109.142247][ T2948] __dump_stack+0x21/0x24 [ 109.146715][ T2948] dump_stack_lvl+0x110/0x170 [ 109.151440][ T2948] ? __cfi_dump_stack_lvl+0x8/0x8 [ 109.156527][ T2948] ? format_decode+0x1bb/0x1520 [ 109.161503][ T2948] dump_stack+0x15/0x24 [ 109.166142][ T2948] should_fail_ex+0x3d4/0x520 [ 109.170980][ T2948] should_fail+0xb/0x10 [ 109.175207][ T2948] should_fail_usercopy+0x1a/0x20 [ 109.180314][ T2948] _copy_from_user+0x1e/0xc0 [ 109.185010][ T2948] kstrtouint_from_user+0xda/0x170 [ 109.190366][ T2948] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 109.196305][ T2948] ? __kasan_check_read+0x11/0x20 [ 109.201448][ T2948] ? _copy_to_user+0x72/0x90 [ 109.206256][ T2948] ? simple_read_from_buffer+0x10f/0x160 [ 109.212093][ T2948] proc_fail_nth_write+0x8b/0x200 [ 109.217142][ T2948] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 109.222821][ T2948] ? security_file_permission+0x8a/0xb0 [ 109.228519][ T2948] ? security_file_permission+0x94/0xb0 [ 109.234091][ T2948] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 109.239848][ T2948] vfs_write+0x40e/0xce0 [ 109.244112][ T2948] ? __kasan_check_read+0x11/0x20 [ 109.249155][ T2948] ? __cfi_vfs_write+0x10/0x10 [ 109.254116][ T2948] ? __kasan_check_write+0x14/0x20 [ 109.259257][ T2948] ? mutex_lock+0x93/0x1b0 [ 109.263700][ T2948] ? __cfi_mutex_lock+0x10/0x10 [ 109.268666][ T2948] ? __fdget_pos+0x2cd/0x380 [ 109.273287][ T2948] ? ksys_write+0x71/0x250 [ 109.277734][ T2948] ksys_write+0x149/0x250 [ 109.282084][ T2948] ? __cfi_ksys_write+0x10/0x10 [ 109.286965][ T2948] ? debug_smp_processor_id+0x17/0x20 [ 109.292534][ T2948] __x64_sys_write+0x7b/0x90 [ 109.297151][ T2948] x64_sys_call+0x27b/0x9a0 [ 109.301773][ T2948] do_syscall_64+0x4c/0xa0 [ 109.306215][ T2948] ? clear_bhb_loop+0x30/0x80 [ 109.311111][ T2948] ? clear_bhb_loop+0x30/0x80 [ 109.315906][ T2948] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 109.321881][ T2948] RIP: 0033:0x7f6abc75d04e [ 109.326498][ T2948] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 109.346404][ T2948] RSP: 002b:00007f6abd61efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 109.354925][ T2948] RAX: ffffffffffffffda RBX: 00007f6abd61f6c0 RCX: 00007f6abc75d04e [ 109.362933][ T2948] RDX: 0000000000000001 RSI: 00007f6abd61f0a0 RDI: 0000000000000005 [ 109.371274][ T2948] RBP: 00007f6abd61f090 R08: 0000000000000000 R09: 0000000000000000 [ 109.379276][ T2948] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 109.387270][ T2948] R13: 00007f6abca16038 R14: 00007f6abca15fa0 R15: 00007fff358b5298 [ 109.395363][ T2948] [ 109.715194][ T2961] device sit0 left promiscuous mode [ 109.827682][ T2963] bridge0: port 4(team_slave_1) entered blocking state [ 109.839841][ T2963] bridge0: port 4(team_slave_1) entered disabled state [ 109.886322][ T2963] device team_slave_1 entered promiscuous mode [ 109.957507][ T2964] device sit0 entered promiscuous mode [ 110.146108][ T2973] device syzkaller0 entered promiscuous mode [ 110.209983][ T2979] device syzkaller0 entered promiscuous mode [ 110.309411][ T28] audit: type=1400 audit(1776083123.777:133): avc: denied { create } for pid=2984 comm="syz.3.924" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 110.828492][ T3001] bridge0: port 4(ip6gretap0) entered blocking state [ 110.850144][ T3001] bridge0: port 4(ip6gretap0) entered disabled state [ 110.900633][ T3001] device ip6gretap0 entered promiscuous mode [ 110.949359][ T3001] bridge0: port 4(ip6gretap0) entered blocking state [ 110.956148][ T3001] bridge0: port 4(ip6gretap0) entered forwarding state [ 111.037708][ T2996] device team_slave_1 left promiscuous mode [ 111.113771][ T2996] bridge0: port 4(team_slave_1) entered disabled state [ 111.500881][ T3024] device syzkaller0 entered promiscuous mode [ 111.590535][ T3022] device syzkaller0 entered promiscuous mode [ 111.688307][ T28] audit: type=1400 audit(1776083125.147:134): avc: denied { create } for pid=3036 comm="syz.0.941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 114.128356][ T3087] device syzkaller0 entered promiscuous mode [ 114.427504][ T3099] device syzkaller0 entered promiscuous mode [ 114.776971][ T3113] device syzkaller0 entered promiscuous mode [ 114.938140][ T3119] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 115.037974][ T3119] device syzkaller0 entered promiscuous mode [ 115.237547][ T3135] device syzkaller0 entered promiscuous mode [ 115.497106][ T3146] device syzkaller0 entered promiscuous mode [ 115.986441][ T3171] device syzkaller0 entered promiscuous mode [ 116.584629][ T3195] device syzkaller0 entered promiscuous mode [ 117.271635][ T3214] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 117.358400][ T3214] device syzkaller0 entered promiscuous mode [ 117.733622][ T3248] device veth0_vlan left promiscuous mode [ 117.756639][ T3248] device veth0_vlan entered promiscuous mode [ 117.784447][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 117.800470][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 117.813687][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 117.832869][ T3248] device sit0 left promiscuous mode [ 119.923120][ T3284] device syzkaller0 entered promiscuous mode [ 119.986327][ T28] audit: type=1400 audit(1776083133.447:135): avc: denied { create } for pid=3285 comm="syz.0.1020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 120.571109][ T3310] device veth1_macvtap left promiscuous mode [ 120.629987][ T3312] device veth1_macvtap entered promiscuous mode [ 120.636375][ T3312] device macsec0 entered promiscuous mode [ 120.910830][ T28] audit: type=1400 audit(1776083134.377:136): avc: denied { create } for pid=3309 comm="syz.1.1027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 121.214292][ T3330] device syzkaller0 entered promiscuous mode [ 121.710779][ T28] audit: type=1400 audit(1776083135.177:137): avc: denied { create } for pid=3336 comm="syz.3.1035" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 122.895980][ T3363] device syzkaller0 entered promiscuous mode [ 122.959854][ T3364] device bridge0 entered promiscuous mode [ 125.361021][ T3385] device pim6reg1 entered promiscuous mode [ 126.656267][ T3394] device syzkaller0 entered promiscuous mode [ 126.819743][ T3398] device syzkaller0 entered promiscuous mode [ 129.074937][ T3443] device syzkaller0 entered promiscuous mode [ 129.623110][ T3456] device syzkaller0 left promiscuous mode [ 130.586794][ T3477] device syzkaller0 entered promiscuous mode [ 130.896078][ T3496] device syzkaller0 entered promiscuous mode [ 131.824905][ T3526] device syzkaller0 entered promiscuous mode [ 132.759494][ T3552] device syzkaller0 entered promiscuous mode [ 132.804563][ T3548] device bridge0 entered promiscuous mode [ 132.998416][ T3569] device syzkaller0 entered promiscuous mode [ 133.927682][ T3602] device syzkaller0 entered promiscuous mode [ 134.440969][ T3615] device syzkaller0 entered promiscuous mode [ 134.700862][ T3623] device team_slave_1 left promiscuous mode [ 134.738100][ T3623] bridge0: port 4(team_slave_1) entered disabled state [ 139.773419][ T3641] device syzkaller0 entered promiscuous mode [ 140.419579][ T3662] tap0: tun_chr_ioctl cmd 1074025672 [ 140.428026][ T3662] tap0: ignored: set checksum disabled [ 140.913478][ T3686] device syzkaller0 entered promiscuous mode [ 142.640569][ T3755] device syzkaller0 entered promiscuous mode [ 142.651086][ T28] audit: type=1400 audit(1776083156.117:138): avc: denied { create } for pid=3752 comm="syz.3.1168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 142.866778][ T3766] device syzkaller0 entered promiscuous mode [ 144.466952][ T3797] device syzkaller0 entered promiscuous mode [ 150.734963][ T3843] device syzkaller0 entered promiscuous mode [ 150.916508][ T3850] device syzkaller0 entered promiscuous mode [ 153.500116][ T3924] device syzkaller0 entered promiscuous mode [ 153.785374][ T28] audit: type=1400 audit(1776083167.247:139): avc: denied { create } for pid=3927 comm="syz.0.1218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 153.964373][ T3934] ±ÿ: renamed from team_slave_1 [ 154.283179][ T3947] device syzkaller0 entered promiscuous mode [ 155.028907][ T3967] FAULT_INJECTION: forcing a failure. [ 155.028907][ T3967] name failslab, interval 1, probability 0, space 0, times 0 [ 155.045684][ T3967] CPU: 0 PID: 3967 Comm: syz.1.1233 Not tainted syzkaller #0 [ 155.053414][ T3967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 155.063605][ T3967] Call Trace: [ 155.066968][ T3967] [ 155.069938][ T3967] __dump_stack+0x21/0x24 [ 155.074415][ T3967] dump_stack_lvl+0x110/0x170 [ 155.079157][ T3967] ? __cfi_dump_stack_lvl+0x8/0x8 [ 155.084423][ T3967] dump_stack+0x15/0x24 [ 155.088647][ T3967] should_fail_ex+0x3d4/0x520 [ 155.093469][ T3967] ? getname_flags+0xb9/0x500 [ 155.098363][ T3967] __should_failslab+0xac/0xf0 [ 155.103280][ T3967] should_failslab+0x9/0x20 [ 155.107828][ T3967] kmem_cache_alloc+0x3b/0x330 [ 155.112650][ T3967] getname_flags+0xb9/0x500 [ 155.117285][ T3967] ? __cfi_vfs_write+0x10/0x10 [ 155.122277][ T3967] getname+0x19/0x20 [ 155.126216][ T3967] do_sys_openat2+0xeb/0x810 [ 155.130857][ T3967] ? hw_breakpoint_exceptions_notify+0x182/0x550 [ 155.137350][ T3967] ? do_sys_open+0xe0/0xe0 [ 155.141824][ T3967] ? notify_die+0x18d/0x1e0 [ 155.146421][ T3967] ? __cfi_notify_die+0x10/0x10 [ 155.151348][ T3967] __x64_sys_openat+0x136/0x160 [ 155.156250][ T3967] x64_sys_call+0x783/0x9a0 [ 155.160806][ T3967] do_syscall_64+0x4c/0xa0 [ 155.165285][ T3967] ? clear_bhb_loop+0x30/0x80 [ 155.170220][ T3967] ? clear_bhb_loop+0x30/0x80 [ 155.175034][ T3967] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 155.181063][ T3967] RIP: 0033:0x7f07fd55d04e [ 155.185520][ T3967] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 155.205766][ T3967] RSP: 002b:00007f07fe521ec8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 155.214751][ T3967] RAX: ffffffffffffffda RBX: 00007f07fe5226c0 RCX: 00007f07fd55d04e [ 155.222958][ T3967] RDX: 0000000000000002 RSI: 00007f07fe521f90 RDI: ffffffffffffff9c [ 155.231068][ T3967] RBP: 00007f07fe522090 R08: 0000000000000000 R09: 0000000000000000 [ 155.239262][ T3967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 155.247621][ T3967] R13: 00007f07fd816038 R14: 00007f07fd815fa0 R15: 00007ffd43db2978 [ 155.255823][ T3967] [ 156.862596][ T3976] device syzkaller0 entered promiscuous mode [ 156.974692][ T3978] device syzkaller0 entered promiscuous mode [ 157.715979][ T3998] device syzkaller0 entered promiscuous mode [ 157.759576][ T3998] PF_CAN: dropped non conform CAN skbuff: dev type 65534, len 65487 [ 158.396875][ T4004] device syzkaller0 entered promiscuous mode [ 159.208677][ T4022] ±ÿ: renamed from team_slave_1 [ 160.264972][ T4047] device syzkaller0 entered promiscuous mode [ 160.306158][ T4038] device wg2 entered promiscuous mode [ 160.441760][ T4059] device syzkaller0 entered promiscuous mode [ 160.471689][ T4059] FAULT_INJECTION: forcing a failure. [ 160.471689][ T4059] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 160.512707][ T4059] CPU: 0 PID: 4059 Comm: syz.3.1265 Not tainted syzkaller #0 [ 160.520240][ T4059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 160.530446][ T4059] Call Trace: [ 160.533760][ T4059] [ 160.536803][ T4059] __dump_stack+0x21/0x24 [ 160.541643][ T4059] dump_stack_lvl+0x110/0x170 [ 160.546411][ T4059] ? __cfi_dump_stack_lvl+0x8/0x8 [ 160.551569][ T4059] ? alloc_skb_with_frags+0xa8/0x620 [ 160.557347][ T4059] ? sock_alloc_send_pskb+0x87f/0x9a0 [ 160.562774][ T4059] dump_stack+0x15/0x24 [ 160.567068][ T4059] should_fail_ex+0x3d4/0x520 [ 160.571801][ T4059] should_fail_alloc_page+0x61/0x90 [ 160.577073][ T4059] prepare_alloc_pages+0x148/0x600 [ 160.582266][ T4059] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 160.587512][ T4059] __alloc_pages+0x15b/0x610 [ 160.592238][ T4059] ? __cfi___alloc_pages+0x10/0x10 [ 160.597481][ T4059] ? __kasan_check_write+0x14/0x20 [ 160.602623][ T4059] ? __build_skb_around+0x24f/0x470 [ 160.607860][ T4059] ? __alloc_skb+0x2df/0x4b0 [ 160.612493][ T4059] alloc_skb_with_frags+0x20c/0x620 [ 160.617744][ T4059] sock_alloc_send_pskb+0x87f/0x9a0 [ 160.623089][ T4059] ? __cfi_sock_alloc_send_pskb+0x10/0x10 [ 160.629899][ T4059] ? stack_trace_save+0xa6/0xf0 [ 160.634910][ T4059] ? iov_iter_advance+0x98/0x1b0 [ 160.639892][ T4059] tun_get_user+0xa63/0x3470 [ 160.644573][ T4059] ? _parse_integer+0x2a/0x40 [ 160.649380][ T4059] ? tun_do_read+0x1cf0/0x1cf0 [ 160.654271][ T4059] ? __kasan_check_write+0x14/0x20 [ 160.659506][ T4059] ? ref_tracker_alloc+0x31d/0x4a0 [ 160.664911][ T4059] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 160.670412][ T4059] ? avc_policy_seqno+0x1b/0x70 [ 160.675306][ T4059] ? selinux_file_permission+0x2a5/0x510 [ 160.680973][ T4059] tun_chr_write_iter+0x1fb/0x300 [ 160.686384][ T4059] vfs_write+0x603/0xce0 [ 160.690692][ T4059] ? __cfi_vfs_write+0x10/0x10 [ 160.695576][ T4059] ? __fget_files+0x2d5/0x330 [ 160.700309][ T4059] ? __fdget_pos+0x1f2/0x380 [ 160.705194][ T4059] ? ksys_write+0x71/0x250 [ 160.709669][ T4059] ksys_write+0x149/0x250 [ 160.714035][ T4059] ? __cfi_ksys_write+0x10/0x10 [ 160.718915][ T4059] ? debug_smp_processor_id+0x17/0x20 [ 160.724421][ T4059] __x64_sys_write+0x7b/0x90 [ 160.729046][ T4059] x64_sys_call+0x27b/0x9a0 [ 160.733676][ T4059] do_syscall_64+0x4c/0xa0 [ 160.738144][ T4059] ? clear_bhb_loop+0x30/0x80 [ 160.742860][ T4059] ? clear_bhb_loop+0x30/0x80 [ 160.747569][ T4059] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 160.753747][ T4059] RIP: 0033:0x7fddb9b9c819 [ 160.758289][ T4059] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 160.778111][ T4059] RSP: 002b:00007fddbaa6b028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 160.786567][ T4059] RAX: ffffffffffffffda RBX: 00007fddb9e15fa0 RCX: 00007fddb9b9c819 [ 160.794631][ T4059] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000009 [ 160.802719][ T4059] RBP: 00007fddbaa6b090 R08: 0000000000000000 R09: 0000000000000000 [ 160.810716][ T4059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 160.818733][ T4059] R13: 00007fddb9e16038 R14: 00007fddb9e15fa0 R15: 00007ffeb203f248 [ 160.826833][ T4059] [ 165.222604][ T4121] FAULT_INJECTION: forcing a failure. [ 165.222604][ T4121] name failslab, interval 1, probability 0, space 0, times 0 [ 165.246138][ T4121] CPU: 1 PID: 4121 Comm: syz.1.1288 Not tainted syzkaller #0 [ 165.253595][ T4121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 165.263700][ T4121] Call Trace: [ 165.267018][ T4121] [ 165.269991][ T4121] __dump_stack+0x21/0x24 [ 165.274495][ T4121] dump_stack_lvl+0x110/0x170 [ 165.279221][ T4121] ? __cfi_dump_stack_lvl+0x8/0x8 [ 165.284329][ T4121] dump_stack+0x15/0x24 [ 165.288537][ T4121] should_fail_ex+0x3d4/0x520 [ 165.293299][ T4121] __should_failslab+0xac/0xf0 [ 165.298208][ T4121] should_failslab+0x9/0x20 [ 165.302912][ T4121] slab_pre_alloc_hook+0x30/0x1e0 [ 165.308014][ T4121] ? __rcu_read_unlock+0xa0/0xa0 [ 165.313007][ T4121] ? kasan_check_range+0x89/0x2a0 [ 165.318079][ T4121] kmem_cache_alloc_lru+0x49/0x280 [ 165.323323][ T4121] ? proc_alloc_inode+0x2a/0xc0 [ 165.328257][ T4121] proc_alloc_inode+0x2a/0xc0 [ 165.332978][ T4121] ? __cfi_proc_alloc_inode+0x10/0x10 [ 165.338832][ T4121] new_inode_pseudo+0x70/0x1f0 [ 165.343641][ T4121] new_inode+0x28/0x1e0 [ 165.348039][ T4121] proc_pid_make_inode+0x27/0x1d0 [ 165.353221][ T4121] proc_pident_instantiate+0x69/0x2b0 [ 165.358686][ T4121] proc_pident_lookup+0x1c7/0x270 [ 165.363948][ T4121] proc_tgid_base_lookup+0x2b/0x30 [ 165.369141][ T4121] __lookup_slow+0x2d5/0x410 [ 165.373775][ T4121] ? lookup_one_len+0x2e0/0x2e0 [ 165.378673][ T4121] ? down_read+0xa6/0xf0 [ 165.382983][ T4121] ? __cfi_down_read+0x10/0x10 [ 165.387840][ T4121] lookup_slow+0x57/0x70 [ 165.392257][ T4121] link_path_walk+0x953/0xe80 [ 165.397542][ T4121] ? handle_lookup_down+0x130/0x130 [ 165.403066][ T4121] path_openat+0x27c/0x2f80 [ 165.407612][ T4121] ? __kasan_slab_alloc+0x72/0x80 [ 165.412767][ T4121] ? slab_post_alloc_hook+0x4f/0x2d0 [ 165.418182][ T4121] ? kmem_cache_alloc+0x16e/0x330 [ 165.423253][ T4121] ? getname_flags+0xb9/0x500 [ 165.427967][ T4121] ? getname+0x19/0x20 [ 165.432076][ T4121] ? do_syscall_64+0x4c/0xa0 [ 165.436820][ T4121] ? do_filp_open+0x430/0x430 [ 165.441547][ T4121] do_filp_open+0x1f1/0x430 [ 165.446149][ T4121] ? __cfi_do_filp_open+0x10/0x10 [ 165.451308][ T4121] ? __cfi_kfree_link+0x10/0x10 [ 165.456205][ T4121] ? alloc_fd+0x4e6/0x590 [ 165.460586][ T4121] do_sys_openat2+0x15e/0x810 [ 165.465306][ T4121] ? tick_program_event+0xa3/0x120 [ 165.470641][ T4121] ? kvm_sched_clock_read+0x18/0x40 [ 165.475894][ T4121] ? do_sys_open+0xe0/0xe0 [ 165.480551][ T4121] ? sched_clock_cpu+0x6e/0x260 [ 165.485541][ T4121] __x64_sys_openat+0x136/0x160 [ 165.490437][ T4121] x64_sys_call+0x783/0x9a0 [ 165.495068][ T4121] do_syscall_64+0x4c/0xa0 [ 165.499511][ T4121] ? clear_bhb_loop+0x30/0x80 [ 165.504224][ T4121] ? clear_bhb_loop+0x30/0x80 [ 165.509193][ T4121] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 165.515294][ T4121] RIP: 0033:0x7f07fd55d04e [ 165.520006][ T4121] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 165.539793][ T4121] RSP: 002b:00007f07fe521ec8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 165.548422][ T4121] RAX: ffffffffffffffda RBX: 00007f07fe5226c0 RCX: 00007f07fd55d04e [ 165.556533][ T4121] RDX: 0000000000000002 RSI: 00007f07fe521f90 RDI: ffffffffffffff9c [ 165.564534][ T4121] RBP: 00007f07fe522090 R08: 0000000000000000 R09: 0000000000000000 [ 165.572627][ T4121] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 165.580804][ T4121] R13: 00007f07fd816038 R14: 00007f07fd815fa0 R15: 00007ffd43db2978 [ 165.589065][ T4121] [ 166.044655][ T4132] device veth1_macvtap left promiscuous mode [ 166.088742][ T4132] device macsec0 left promiscuous mode [ 166.148486][ T4136] device veth1_macvtap entered promiscuous mode [ 166.155734][ T4136] device macsec0 entered promiscuous mode [ 166.227170][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 166.342987][ T4139] device sit0 left promiscuous mode [ 167.008833][ T4162] device veth1_macvtap left promiscuous mode [ 167.016195][ T4162] device macsec0 left promiscuous mode [ 168.196151][ T4178] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 168.237973][ T4178] device syzkaller0 entered promiscuous mode [ 169.792442][ T4219] device veth1_macvtap left promiscuous mode [ 170.072606][ T4225] FAULT_INJECTION: forcing a failure. [ 170.072606][ T4225] name failslab, interval 1, probability 0, space 0, times 0 [ 170.112526][ T28] audit: type=1400 audit(1776083183.577:140): avc: denied { create } for pid=4227 comm="syz.3.1321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 170.132447][ T4225] CPU: 0 PID: 4225 Comm: syz.0.1318 Not tainted syzkaller #0 [ 170.140048][ T4225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 170.150365][ T4225] Call Trace: [ 170.153769][ T4225] [ 170.156982][ T4225] __dump_stack+0x21/0x24 [ 170.161354][ T4225] dump_stack_lvl+0x110/0x170 [ 170.166090][ T4225] ? __cfi_dump_stack_lvl+0x8/0x8 [ 170.171405][ T4225] ? avc_has_perm_noaudit+0x30b/0x490 [ 170.177016][ T4225] dump_stack+0x15/0x24 [ 170.181206][ T4225] should_fail_ex+0x3d4/0x520 [ 170.185947][ T4225] __should_failslab+0xac/0xf0 [ 170.190910][ T4225] should_failslab+0x9/0x20 [ 170.195639][ T4225] slab_pre_alloc_hook+0x30/0x1e0 [ 170.200805][ T4225] ? selinux_inode_permission+0x415/0x5f0 [ 170.206836][ T4225] ? step_into+0x42f/0xf40 [ 170.211536][ T4225] kmem_cache_alloc_lru+0x49/0x280 [ 170.216928][ T4225] ? __d_alloc+0x34/0x6c0 [ 170.221316][ T4225] __d_alloc+0x34/0x6c0 [ 170.225901][ T4225] ? __cfi__raw_spin_lock+0x10/0x10 [ 170.231141][ T4225] ? down_read+0xa6/0xf0 [ 170.235415][ T4225] d_alloc_parallel+0xe2/0x12e0 [ 170.240769][ T4225] ? __kasan_check_write+0x14/0x20 [ 170.245915][ T4225] ? rwsem_read_trylock+0x2ae/0x640 [ 170.251237][ T4225] ? downgrade_write+0x370/0x370 [ 170.256230][ T4225] ? __d_lookup+0x51c/0x5b0 [ 170.260788][ T4225] ? __cfi_d_alloc_parallel+0x10/0x10 [ 170.266204][ T4225] ? down_read+0xa6/0xf0 [ 170.270475][ T4225] ? __cfi_down_read+0x10/0x10 [ 170.275291][ T4225] path_openat+0x961/0x2f80 [ 170.279854][ T4225] ? __kasan_slab_alloc+0x72/0x80 [ 170.284932][ T4225] ? do_filp_open+0x430/0x430 [ 170.289871][ T4225] do_filp_open+0x1f1/0x430 [ 170.294588][ T4225] ? __cfi_do_filp_open+0x10/0x10 [ 170.299654][ T4225] ? __cfi_kfree_link+0x10/0x10 [ 170.304663][ T4225] ? alloc_fd+0x4e6/0x590 [ 170.309134][ T4225] do_sys_openat2+0x15e/0x810 [ 170.313968][ T4225] ? hw_breakpoint_exceptions_notify+0x182/0x550 [ 170.320505][ T4225] ? do_sys_open+0xe0/0xe0 [ 170.324981][ T4225] ? notify_die+0x18d/0x1e0 [ 170.329607][ T4225] ? __cfi_notify_die+0x10/0x10 [ 170.334687][ T4225] __x64_sys_openat+0x136/0x160 [ 170.339596][ T4225] x64_sys_call+0x783/0x9a0 [ 170.344268][ T4225] do_syscall_64+0x4c/0xa0 [ 170.348791][ T4225] ? clear_bhb_loop+0x30/0x80 [ 170.353590][ T4225] ? clear_bhb_loop+0x30/0x80 [ 170.358420][ T4225] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 170.364335][ T4225] RIP: 0033:0x7f6abc75d04e [ 170.368950][ T4225] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 170.388846][ T4225] RSP: 002b:00007f6abd61eec8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 170.397466][ T4225] RAX: ffffffffffffffda RBX: 00007f6abd61f6c0 RCX: 00007f6abc75d04e [ 170.405477][ T4225] RDX: 0000000000000002 RSI: 00007f6abd61ef90 RDI: ffffffffffffff9c [ 170.413500][ T4225] RBP: 00007f6abd61f090 R08: 0000000000000000 R09: 0000000000000000 [ 170.421826][ T4225] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 170.429913][ T4225] R13: 00007f6abca16038 R14: 00007f6abca15fa0 R15: 00007fff358b5298 [ 170.438093][ T4225] [ 171.614871][ T4242] ref_ctr_offset mismatch. inode: 0x5e7 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 171.731179][ T4246] GPL: port 1(erspan0) entered blocking state [ 171.760626][ T4246] GPL: port 1(erspan0) entered disabled state [ 171.770597][ T4246] device erspan0 entered promiscuous mode [ 171.777579][ T4248] GPL: port 1(erspan0) entered blocking state [ 171.784018][ T4248] GPL: port 1(erspan0) entered forwarding state [ 173.929520][ T4288] device xfrm0 entered promiscuous mode [ 174.302808][ T4310] ref_ctr_offset mismatch. inode: 0x55d offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 174.504372][ T4311] GPL: port 1(erspan0) entered blocking state [ 174.547968][ T4311] GPL: port 1(erspan0) entered disabled state [ 174.562649][ T4311] device erspan0 entered promiscuous mode [ 174.590341][ T4310] GPL: port 1(erspan0) entered blocking state [ 174.596817][ T4310] GPL: port 1(erspan0) entered forwarding state [ 175.308617][ T4343] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 175.328418][ T4343] syzkaller0: linktype set to 823 [ 175.474851][ T4352] device syzkaller0 entered promiscuous mode [ 175.585174][ T28] audit: type=1400 audit(1776083189.047:141): avc: denied { create } for pid=4356 comm="syz.2.1362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 175.635345][ T4355] device syzkaller0 left promiscuous mode [ 177.534800][ T4398] device wg2 entered promiscuous mode [ 177.961091][ T4413] device syzkaller0 entered promiscuous mode [ 178.372511][ T4422] device syzkaller0 entered promiscuous mode [ 178.802942][ C1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 178.803027][ T284] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 180.456647][ T4497] FAULT_INJECTION: forcing a failure. [ 180.456647][ T4497] name failslab, interval 1, probability 0, space 0, times 0 [ 180.485063][ T4497] CPU: 0 PID: 4497 Comm: syz.1.1403 Not tainted syzkaller #0 [ 180.492528][ T4497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 180.502640][ T4497] Call Trace: [ 180.505970][ T4497] [ 180.508943][ T4497] __dump_stack+0x21/0x24 [ 180.513362][ T4497] dump_stack_lvl+0x110/0x170 [ 180.518198][ T4497] ? __cfi_dump_stack_lvl+0x8/0x8 [ 180.523279][ T4497] ? avc_has_perm+0x163/0x250 [ 180.528109][ T4497] dump_stack+0x15/0x24 [ 180.532540][ T4497] should_fail_ex+0x3d4/0x520 [ 180.537270][ T4497] __should_failslab+0xac/0xf0 [ 180.542175][ T4497] should_failslab+0x9/0x20 [ 180.546982][ T4497] slab_pre_alloc_hook+0x30/0x1e0 [ 180.552153][ T4497] ? __kasan_check_write+0x14/0x20 [ 180.557413][ T4497] kmem_cache_alloc_lru+0x49/0x280 [ 180.562773][ T4497] ? sock_alloc_inode+0x28/0xc0 [ 180.567685][ T4497] sock_alloc_inode+0x28/0xc0 [ 180.572695][ T4497] ? __cfi_sock_alloc_inode+0x10/0x10 [ 180.578139][ T4497] new_inode_pseudo+0x70/0x1f0 [ 180.582964][ T4497] __sock_create+0x12c/0x7c0 [ 180.587692][ T4497] __sys_socketpair+0x1a1/0x5b0 [ 180.592601][ T4497] __x64_sys_socketpair+0x9b/0xb0 [ 180.597699][ T4497] x64_sys_call+0x6e/0x9a0 [ 180.602268][ T4497] do_syscall_64+0x4c/0xa0 [ 180.606840][ T4497] ? clear_bhb_loop+0x30/0x80 [ 180.611565][ T4497] ? clear_bhb_loop+0x30/0x80 [ 180.616654][ T4497] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 180.622770][ T4497] RIP: 0033:0x7f07fd59c819 [ 180.627234][ T4497] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 180.647236][ T4497] RSP: 002b:00007f07fe522028 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 180.656050][ T4497] RAX: ffffffffffffffda RBX: 00007f07fd815fa0 RCX: 00007f07fd59c819 [ 180.664637][ T4497] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 180.672829][ T4497] RBP: 00007f07fe522090 R08: 0000000000000000 R09: 0000000000000000 [ 180.681027][ T4497] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 180.689479][ T4497] R13: 00007f07fd816038 R14: 00007f07fd815fa0 R15: 00007ffd43db2978 [ 180.697590][ T4497] [ 180.715332][ T4497] socket: no more sockets [ 182.337038][ T4537] FAULT_INJECTION: forcing a failure. [ 182.337038][ T4537] name failslab, interval 1, probability 0, space 0, times 0 [ 182.415446][ T4537] CPU: 1 PID: 4537 Comm: syz.3.1416 Not tainted syzkaller #0 [ 182.422989][ T4537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 182.433312][ T4537] Call Trace: [ 182.436660][ T4537] [ 182.439723][ T4537] __dump_stack+0x21/0x24 [ 182.444285][ T4537] dump_stack_lvl+0x110/0x170 [ 182.449036][ T4537] ? __cfi_dump_stack_lvl+0x8/0x8 [ 182.454125][ T4537] dump_stack+0x15/0x24 [ 182.458414][ T4537] should_fail_ex+0x3d4/0x520 [ 182.463245][ T4537] ? security_inode_alloc+0x33/0x120 [ 182.468576][ T4537] __should_failslab+0xac/0xf0 [ 182.473418][ T4537] should_failslab+0x9/0x20 [ 182.477970][ T4537] kmem_cache_alloc+0x3b/0x330 [ 182.482813][ T4537] security_inode_alloc+0x33/0x120 [ 182.487963][ T4537] inode_init_always+0x6fc/0x960 [ 182.492947][ T4537] new_inode_pseudo+0xa2/0x1f0 [ 182.497760][ T4537] __sock_create+0x12c/0x7c0 [ 182.502589][ T4537] __sys_socketpair+0x1a1/0x5b0 [ 182.507571][ T4537] __x64_sys_socketpair+0x9b/0xb0 [ 182.512645][ T4537] x64_sys_call+0x6e/0x9a0 [ 182.517197][ T4537] do_syscall_64+0x4c/0xa0 [ 182.521897][ T4537] ? clear_bhb_loop+0x30/0x80 [ 182.526691][ T4537] ? clear_bhb_loop+0x30/0x80 [ 182.531411][ T4537] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 182.537544][ T4537] RIP: 0033:0x7fddb9b9c819 [ 182.541991][ T4537] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 182.561962][ T4537] RSP: 002b:00007fddbaa6b028 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 182.570417][ T4537] RAX: ffffffffffffffda RBX: 00007fddb9e15fa0 RCX: 00007fddb9b9c819 [ 182.578688][ T4537] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 182.586874][ T4537] RBP: 00007fddbaa6b090 R08: 0000000000000000 R09: 0000000000000000 [ 182.595164][ T4537] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 182.603165][ T4537] R13: 00007fddb9e16038 R14: 00007fddb9e15fa0 R15: 00007ffeb203f248 [ 182.611176][ T4537] [ 182.628640][ T4537] socket: no more sockets [ 182.945781][ T4552] device syz_tun entered promiscuous mode [ 183.190067][ T4558] device syzkaller0 entered promiscuous mode [ 183.487338][ T4568] device syzkaller0 entered promiscuous mode [ 184.059031][ T4592] device GPL entered promiscuous mode [ 184.126952][ T28] audit: type=1400 audit(1776083197.587:142): avc: denied { ioctl } for pid=4589 comm="syz.1.1434" path="cgroup:[4026532291]" dev="nsfs" ino=4026532291 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 184.434945][ T4603] device syzkaller0 entered promiscuous mode [ 185.058660][ T28] audit: type=1400 audit(1776083198.527:143): avc: denied { create } for pid=4630 comm="syz.0.1448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 185.209185][ T4641] device syzkaller0 entered promiscuous mode [ 185.224474][ T28] audit: type=1400 audit(1776083198.667:144): avc: denied { create } for pid=4637 comm="syz.3.1449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 185.287285][ T4646] device syzkaller0 entered promiscuous mode [ 186.000560][ T4684] FAULT_INJECTION: forcing a failure. [ 186.000560][ T4684] name failslab, interval 1, probability 0, space 0, times 0 [ 186.013993][ T4684] CPU: 1 PID: 4684 Comm: syz.4.1465 Not tainted syzkaller #0 [ 186.021764][ T4684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 186.031966][ T4684] Call Trace: [ 186.035376][ T4684] [ 186.038353][ T4684] __dump_stack+0x21/0x24 [ 186.042738][ T4684] dump_stack_lvl+0x110/0x170 [ 186.047547][ T4684] ? __cfi_dump_stack_lvl+0x8/0x8 [ 186.052624][ T4684] ? __cfi_avc_has_perm+0x10/0x10 [ 186.057721][ T4684] dump_stack+0x15/0x24 [ 186.061927][ T4684] should_fail_ex+0x3d4/0x520 [ 186.066661][ T4684] __should_failslab+0xac/0xf0 [ 186.071560][ T4684] ? proc_self_get_link+0xe6/0x180 [ 186.076810][ T4684] should_failslab+0x9/0x20 [ 186.081438][ T4684] __kmem_cache_alloc_node+0x3d/0x2c0 [ 186.086862][ T4684] ? proc_self_get_link+0xe6/0x180 [ 186.092021][ T4684] kmalloc_trace+0x29/0xb0 [ 186.096509][ T4684] proc_self_get_link+0xe6/0x180 [ 186.101745][ T4684] ? __cfi_proc_self_get_link+0x10/0x10 [ 186.107422][ T4684] pick_link+0x72e/0xe30 [ 186.111720][ T4684] step_into+0xc5c/0xf40 [ 186.116212][ T4684] ? __d_lookup_rcu+0x37b/0x400 [ 186.121169][ T4684] ? set_root+0x400/0x400 [ 186.125905][ T4684] ? inode_permission+0xef/0x4b0 [ 186.130894][ T4684] link_path_walk+0x6c1/0xe80 [ 186.136686][ T4684] ? handle_lookup_down+0x130/0x130 [ 186.142589][ T4684] path_openat+0x27c/0x2f80 [ 186.147350][ T4684] ? __kasan_slab_alloc+0x72/0x80 [ 186.152522][ T4684] ? slab_post_alloc_hook+0x4f/0x2d0 [ 186.158008][ T4684] ? kmem_cache_alloc+0x16e/0x330 [ 186.163266][ T4684] ? getname_flags+0xb9/0x500 [ 186.168486][ T4684] ? getname+0x19/0x20 [ 186.172702][ T4684] ? do_syscall_64+0x4c/0xa0 [ 186.177369][ T4684] ? do_filp_open+0x430/0x430 [ 186.182122][ T4684] do_filp_open+0x1f1/0x430 [ 186.186695][ T4684] ? __cfi_do_filp_open+0x10/0x10 [ 186.192062][ T4684] ? alloc_fd+0x4e6/0x590 [ 186.196658][ T4684] do_sys_openat2+0x15e/0x810 [ 186.201430][ T4684] ? tick_program_event+0xa3/0x120 [ 186.206618][ T4684] ? kvm_sched_clock_read+0x18/0x40 [ 186.212101][ T4684] ? do_sys_open+0xe0/0xe0 [ 186.216684][ T4684] ? sched_clock_cpu+0x6e/0x260 [ 186.221626][ T4684] __x64_sys_openat+0x136/0x160 [ 186.226730][ T4684] x64_sys_call+0x783/0x9a0 [ 186.231831][ T4684] do_syscall_64+0x4c/0xa0 [ 186.236415][ T4684] ? clear_bhb_loop+0x30/0x80 [ 186.241361][ T4684] ? clear_bhb_loop+0x30/0x80 [ 186.246115][ T4684] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 186.252289][ T4684] RIP: 0033:0x7f818015d04e [ 186.256830][ T4684] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 186.276756][ T4684] RSP: 002b:00007f81810e5ec8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 186.285583][ T4684] RAX: ffffffffffffffda RBX: 00007f81810e66c0 RCX: 00007f818015d04e [ 186.293872][ T4684] RDX: 0000000000000000 RSI: 00007f81810e5f90 RDI: ffffffffffffff9c [ 186.302124][ T4684] RBP: 00007f81810e6090 R08: 0000000000000000 R09: 0000000000000000 [ 186.310230][ T4684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 186.318868][ T4684] R13: 00007f8180416038 R14: 00007f8180415fa0 R15: 00007ffe5b468738 [ 186.326995][ T4684] [ 186.468524][ T28] audit: type=1400 audit(1776083199.927:145): avc: denied { read } for pid=4683 comm="syz.4.1465" dev="nsfs" ino=4026532540 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 186.563163][ T28] audit: type=1400 audit(1776083199.937:146): avc: denied { open } for pid=4683 comm="syz.4.1465" path="pid:[4026532540]" dev="nsfs" ino=4026532540 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 186.605527][ T4689] device syz_tun entered promiscuous mode [ 186.668137][ T4689] IPv6: ADDRCONF(NETDEV_CHANGE): syz_tun: link becomes ready [ 187.343739][ T4710] device syzkaller0 entered promiscuous mode [ 187.708806][ T4720] device wg2 left promiscuous mode [ 187.771877][ T4728] FAULT_INJECTION: forcing a failure. [ 187.771877][ T4728] name failslab, interval 1, probability 0, space 0, times 0 [ 187.788060][ T4728] CPU: 1 PID: 4728 Comm: syz.2.1478 Not tainted syzkaller #0 [ 187.795506][ T4728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 187.805707][ T4728] Call Trace: [ 187.809036][ T4728] [ 187.812009][ T4728] __dump_stack+0x21/0x24 [ 187.816402][ T4728] dump_stack_lvl+0x110/0x170 [ 187.821181][ T4728] ? __cfi_dump_stack_lvl+0x8/0x8 [ 187.826359][ T4728] ? dump_stack+0x9/0x24 [ 187.830662][ T4728] dump_stack+0x15/0x24 [ 187.834876][ T4728] should_fail_ex+0x3d4/0x520 [ 187.839695][ T4728] __should_failslab+0xac/0xf0 [ 187.844593][ T4728] should_failslab+0x9/0x20 [ 187.849151][ T4728] slab_pre_alloc_hook+0x30/0x1e0 [ 187.854410][ T4728] ? ktime_get_coarse_real_ts64+0x11b/0x130 [ 187.860454][ T4728] kmem_cache_alloc_lru+0x49/0x280 [ 187.865625][ T4728] ? new_inode_pseudo+0x8f/0x1f0 [ 187.870632][ T4728] new_inode_pseudo+0x8f/0x1f0 [ 187.875485][ T4728] __ns_get_path+0x16e/0x470 [ 187.880171][ T4728] ns_get_path+0x66/0xa0 [ 187.884554][ T4728] proc_ns_get_link+0xf7/0x210 [ 187.889393][ T4728] ? __cfi_proc_ns_get_link+0x10/0x10 [ 187.894819][ T4728] ? security_inode_follow_link+0xd5/0x120 [ 187.900675][ T4728] ? __cfi_proc_ns_get_link+0x10/0x10 [ 187.906093][ T4728] pick_link+0x6dd/0xe30 [ 187.910405][ T4728] step_into+0xc5c/0xf40 [ 187.914786][ T4728] ? set_root+0x400/0x400 [ 187.919174][ T4728] path_openat+0x166c/0x2f80 [ 187.923812][ T4728] ? __kasan_slab_alloc+0x72/0x80 [ 187.928927][ T4728] ? slab_post_alloc_hook+0x4f/0x2d0 [ 187.934367][ T4728] ? getname_flags+0xb9/0x500 [ 187.939175][ T4728] ? getname+0x19/0x20 [ 187.943471][ T4728] ? do_filp_open+0x430/0x430 [ 187.948195][ T4728] do_filp_open+0x1f1/0x430 [ 187.952993][ T4728] ? __cfi_do_filp_open+0x10/0x10 [ 187.958074][ T4728] ? alloc_fd+0x4e6/0x590 [ 187.962452][ T4728] do_sys_openat2+0x15e/0x810 [ 187.967285][ T4728] ? blkcg_maybe_throttle_current+0x1e0/0xa20 [ 187.973497][ T4728] ? do_sys_open+0xe0/0xe0 [ 187.977966][ T4728] ? task_work_run+0x208/0x250 [ 187.982790][ T4728] ? __cfi_blkcg_maybe_throttle_current+0x10/0x10 [ 187.989347][ T4728] ? __cfi_notify_die+0x10/0x10 [ 187.994239][ T4728] __x64_sys_openat+0x136/0x160 [ 187.999233][ T4728] x64_sys_call+0x783/0x9a0 [ 188.003786][ T4728] do_syscall_64+0x4c/0xa0 [ 188.008254][ T4728] ? clear_bhb_loop+0x30/0x80 [ 188.013061][ T4728] ? clear_bhb_loop+0x30/0x80 [ 188.017865][ T4728] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 188.023979][ T4728] RIP: 0033:0x7f109075d04e [ 188.028452][ T4728] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 188.048510][ T4728] RSP: 002b:00007f108f1f6ec8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 188.057487][ T4728] RAX: ffffffffffffffda RBX: 00007f108f1f76c0 RCX: 00007f109075d04e [ 188.065514][ T4728] RDX: 0000000000000000 RSI: 00007f108f1f6f90 RDI: ffffffffffffff9c [ 188.073522][ T4728] RBP: 00007f108f1f7090 R08: 0000000000000000 R09: 0000000000000000 [ 188.081536][ T4728] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 188.089703][ T4728] R13: 00007f1090a16038 R14: 00007f1090a15fa0 R15: 00007ffe4ccff4b8 [ 188.097791][ T4728] [ 188.294150][ T4739] device veth0_vlan left promiscuous mode [ 188.325986][ T28] audit: type=1400 audit(1776083201.787:147): avc: denied { create } for pid=4742 comm="syz.3.1486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 188.349643][ T4739] device veth0_vlan entered promiscuous mode [ 188.440161][ T4732] device sit0 left promiscuous mode [ 188.617277][ T4739] device sit0 entered promiscuous mode [ 189.085681][ T4763] bridge0: port 4(ip6gretap0) entered disabled state [ 189.093129][ T4763] bridge0: port 3(gretap0) entered disabled state [ 189.100322][ T4763] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.108101][ T4763] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.440148][ T4773] FAULT_INJECTION: forcing a failure. [ 189.440148][ T4773] name failslab, interval 1, probability 0, space 0, times 0 [ 189.473784][ T4773] CPU: 1 PID: 4773 Comm: syz.4.1494 Not tainted syzkaller #0 [ 189.483426][ T4773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 189.493700][ T4773] Call Trace: [ 189.497144][ T4773] [ 189.500115][ T4773] __dump_stack+0x21/0x24 [ 189.504507][ T4773] dump_stack_lvl+0x110/0x170 [ 189.509432][ T4773] ? __cfi_dump_stack_lvl+0x8/0x8 [ 189.514546][ T4773] ? __sanitizer_cov_trace_pc+0x1/0x60 [ 189.520152][ T4773] dump_stack+0x15/0x24 [ 189.524363][ T4773] should_fail_ex+0x3d4/0x520 [ 189.529178][ T4773] ? security_inode_alloc+0x33/0x120 [ 189.534687][ T4773] __should_failslab+0xac/0xf0 [ 189.539751][ T4773] should_failslab+0x9/0x20 [ 189.544289][ T4773] kmem_cache_alloc+0x3b/0x330 [ 189.549274][ T4773] security_inode_alloc+0x33/0x120 [ 189.554622][ T4773] inode_init_always+0x6fc/0x960 [ 189.559869][ T4773] new_inode_pseudo+0xa2/0x1f0 [ 189.564683][ T4773] __ns_get_path+0x16e/0x470 [ 189.569406][ T4773] ns_get_path+0x66/0xa0 [ 189.573711][ T4773] proc_ns_get_link+0xf7/0x210 [ 189.578763][ T4773] ? __cfi_proc_ns_get_link+0x10/0x10 [ 189.584372][ T4773] ? security_inode_follow_link+0xd5/0x120 [ 189.590395][ T4773] ? __cfi_proc_ns_get_link+0x10/0x10 [ 189.595810][ T4773] pick_link+0x6dd/0xe30 [ 189.600106][ T4773] step_into+0xc5c/0xf40 [ 189.604498][ T4773] ? set_root+0x400/0x400 [ 189.609222][ T4773] path_openat+0x166c/0x2f80 [ 189.614249][ T4773] ? __kasan_slab_alloc+0x72/0x80 [ 189.619329][ T4773] ? slab_post_alloc_hook+0x4f/0x2d0 [ 189.624673][ T4773] ? getname_flags+0xb9/0x500 [ 189.629474][ T4773] ? getname+0x19/0x20 [ 189.633628][ T4773] ? do_filp_open+0x430/0x430 [ 189.638449][ T4773] do_filp_open+0x1f1/0x430 [ 189.643084][ T4773] ? __cfi_do_filp_open+0x10/0x10 [ 189.648543][ T4773] ? alloc_fd+0x4e6/0x590 [ 189.652934][ T4773] do_sys_openat2+0x15e/0x810 [ 189.657655][ T4773] ? tick_program_event+0xa3/0x120 [ 189.662810][ T4773] ? kvm_sched_clock_read+0x18/0x40 [ 189.668330][ T4773] ? do_sys_open+0xe0/0xe0 [ 189.672865][ T4773] ? sched_clock_cpu+0x6e/0x260 [ 189.677951][ T4773] __x64_sys_openat+0x136/0x160 [ 189.683553][ T4773] x64_sys_call+0x783/0x9a0 [ 189.688190][ T4773] do_syscall_64+0x4c/0xa0 [ 189.692762][ T4773] ? clear_bhb_loop+0x30/0x80 [ 189.697765][ T4773] ? clear_bhb_loop+0x30/0x80 [ 189.702625][ T4773] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 189.709630][ T4773] RIP: 0033:0x7f818015d04e [ 189.714222][ T4773] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 189.734058][ T4773] RSP: 002b:00007f81810e5ec8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 189.742528][ T4773] RAX: ffffffffffffffda RBX: 00007f81810e66c0 RCX: 00007f818015d04e [ 189.750758][ T4773] RDX: 0000000000000000 RSI: 00007f81810e5f90 RDI: ffffffffffffff9c [ 189.758959][ T4773] RBP: 00007f81810e6090 R08: 0000000000000000 R09: 0000000000000000 [ 189.767249][ T4773] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 189.775535][ T4773] R13: 00007f8180416038 R14: 00007f8180415fa0 R15: 00007ffe5b468738 [ 189.783680][ T4773] [ 191.029395][ T4787] pimreg1: tun_chr_ioctl cmd 1074025694 [ 193.092452][ T4856] device wg2 entered promiscuous mode [ 193.105710][ T4864] ================================================================== [ 193.113929][ T4864] BUG: KASAN: slab-out-of-bounds in __bpf_get_stackid+0x6fa/0x960 [ 193.122540][ T4864] Write of size 64 at addr ffff88811929a290 by task syz.2.1526/4864 [ 193.130657][ T4864] [ 193.133031][ T4864] CPU: 0 PID: 4864 Comm: syz.2.1526 Not tainted syzkaller #0 [ 193.140506][ T4864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 193.150734][ T4864] Call Trace: [ 193.154144][ T4864] [ 193.157290][ T4864] __dump_stack+0x21/0x24 [ 193.161791][ T4864] dump_stack_lvl+0x110/0x170 [ 193.166618][ T4864] ? __cfi_dump_stack_lvl+0x8/0x8 [ 193.171721][ T4864] ? __bpf_get_stackid+0x6fa/0x960 [ 193.177158][ T4864] print_address_description+0x71/0x200 [ 193.182854][ T4864] print_report+0x4a/0x60 [ 193.187245][ T4864] kasan_report+0x122/0x150 [ 193.192063][ T4864] ? __bpf_get_stackid+0x6fa/0x960 [ 193.197314][ T4864] kasan_check_range+0x249/0x2a0 [ 193.202394][ T4864] ? __bpf_get_stackid+0x6fa/0x960 [ 193.208119][ T4864] memcpy+0x44/0x70 [ 193.212176][ T4864] __bpf_get_stackid+0x6fa/0x960 [ 193.217275][ T4864] bpf_get_stackid_pe+0x2ee/0x400 [ 193.222751][ T4864] bpf_prog_02c92f715e75ceb8+0x28/0x3d [ 193.228439][ T4864] ? sched_clock+0x9/0x10 [ 193.233020][ T4864] bpf_overflow_handler+0x51f/0x5e0 [ 193.238383][ T4864] ? __cfi_bpf_overflow_handler+0x10/0x10 [ 193.244237][ T4864] ? __this_cpu_preempt_check+0x13/0x20 [ 193.249838][ T4864] ? __perf_event_account_interrupt+0x1a4/0x2c0 [ 193.256217][ T4864] __perf_event_overflow+0x437/0x620 [ 193.261767][ T4864] perf_swevent_event+0x2f7/0x530 [ 193.266846][ T4864] ___perf_sw_event+0x3bf/0x4f0 [ 193.271833][ T4864] ? __cfi____perf_sw_event+0x10/0x10 [ 193.277270][ T4864] ? _raw_spin_unlock+0x4c/0x70 [ 193.282254][ T4864] ? __schedule+0xcfb/0x1500 [ 193.286999][ T4864] __perf_sw_event+0x134/0x270 [ 193.291964][ T4864] do_user_addr_fault+0xffb/0x1050 [ 193.297117][ T4864] ? __kasan_check_read+0x11/0x20 [ 193.302190][ T4864] ? preempt_schedule_common+0xbe/0xf0 [ 193.307676][ T4864] ? preempt_schedule+0xbc/0xd0 [ 193.312737][ T4864] ? ttwu_do_wakeup+0x468/0x490 [ 193.317666][ T4864] exc_page_fault+0x51/0xb0 [ 193.322222][ T4864] asm_exc_page_fault+0x27/0x30 [ 193.327373][ T4864] RIP: 0010:strncpy_from_user+0xdf/0x2d0 [ 193.333037][ T4864] Code: 00 00 4c 89 ee e8 91 18 e2 fe 49 83 fd 07 0f 86 a2 00 00 00 4c 89 75 c0 49 c7 c7 f8 ff ff ff 45 31 e4 4c 89 65 c8 48 8b 45 c0 <4a> 8b 1c 20 48 b8 ff fe fe fe fe fe fe fe 4c 8d 34 03 49 89 dc 49 [ 193.352946][ T4864] RSP: 0018:ffffc9000ff9fb28 EFLAGS: 00050246 [ 193.359055][ T4864] RAX: 0000000000000000 RBX: 000000000000007f RCX: ffff88811b08bcc0 [ 193.367056][ T4864] RDX: 0000000000000002 RSI: 000000000000007f RDI: 0000000000000007 [ 193.375144][ T4864] RBP: ffffc9000ff9fb70 R08: ffff88811b08bcc0 R09: 0000000000000002 [ 193.383162][ T4864] R10: 0000000000000001 R11: 0000000000000002 R12: 0000000000000000 [ 193.391176][ T4864] R13: 000000000000007f R14: 0000000000000000 R15: fffffffffffffff8 [ 193.399200][ T4864] ? strncpy_from_user+0xbf/0x2d0 [ 193.404296][ T4864] bpf_prog_load+0x1fe/0x16a0 [ 193.409110][ T4864] ? map_freeze+0x390/0x390 [ 193.413742][ T4864] ? selinux_bpf+0xc7/0xf0 [ 193.418185][ T4864] ? security_bpf+0x93/0xb0 [ 193.422808][ T4864] __sys_bpf+0x57b/0x850 [ 193.427175][ T4864] ? bpf_link_show_fdinfo+0x330/0x330 [ 193.432788][ T4864] ? fpregs_restore_userregs+0x128/0x260 [ 193.438467][ T4864] __x64_sys_bpf+0x7c/0x90 [ 193.443114][ T4864] x64_sys_call+0x488/0x9a0 [ 193.448028][ T4864] do_syscall_64+0x4c/0xa0 [ 193.452968][ T4864] ? clear_bhb_loop+0x30/0x80 [ 193.457736][ T4864] ? clear_bhb_loop+0x30/0x80 [ 193.462562][ T4864] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 193.468502][ T4864] RIP: 0033:0x7f109079c819 [ 193.473032][ T4864] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 193.493018][ T4864] RSP: 002b:00007f108f1f7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 193.501681][ T4864] RAX: ffffffffffffffda RBX: 00007f1090a15fa0 RCX: 00007f109079c819 [ 193.509975][ T4864] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 193.518079][ T4864] RBP: 00007f1090832c91 R08: 0000000000000000 R09: 0000000000000000 [ 193.526270][ T4864] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 193.534444][ T4864] R13: 00007f1090a16038 R14: 00007f1090a15fa0 R15: 00007ffe4ccff4b8 [ 193.542544][ T4864] [ 193.545711][ T4864] [ 193.548316][ T4864] Allocated by task 4864: [ 193.552662][ T4864] kasan_set_track+0x4b/0x70 [ 193.557292][ T4864] kasan_save_alloc_info+0x25/0x30 [ 193.562619][ T4864] __kasan_kmalloc+0x95/0xb0 [ 193.567239][ T4864] __kmalloc_node+0xb2/0x1e0 [ 193.571962][ T4864] bpf_map_area_alloc+0x4b/0xe0 [ 193.576856][ T4864] prealloc_elems_and_freelist+0x8a/0x1e0 [ 193.582612][ T4864] stack_map_alloc+0x3a7/0x530 [ 193.587514][ T4864] map_create+0x49c/0xd80 [ 193.592072][ T4864] __sys_bpf+0x34e/0x850 [ 193.596528][ T4864] __x64_sys_bpf+0x7c/0x90 [ 193.600989][ T4864] x64_sys_call+0x488/0x9a0 [ 193.605536][ T4864] do_syscall_64+0x4c/0xa0 [ 193.610087][ T4864] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 193.616140][ T4864] [ 193.618552][ T4864] The buggy address belongs to the object at ffff88811929a280 [ 193.618552][ T4864] which belongs to the cache kmalloc-64 of size 64 [ 193.632735][ T4864] The buggy address is located 16 bytes inside of [ 193.632735][ T4864] 64-byte region [ffff88811929a280, ffff88811929a2c0) [ 193.646072][ T4864] [ 193.648433][ T4864] The buggy address belongs to the physical page: [ 193.654868][ T4864] page:ffffea000464a680 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11929a [ 193.665603][ T4864] flags: 0x4000000000000200(slab|zone=1) [ 193.671310][ T4864] raw: 4000000000000200 ffffea00044e0780 dead000000000005 ffff888100042780 [ 193.679928][ T4864] raw: 0000000000000000 0000000000200020 00000001ffffffff 0000000000000000 [ 193.688618][ T4864] page dumped because: kasan: bad access detected [ 193.695170][ T4864] page_owner tracks the page as allocated [ 193.700913][ T4864] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 3951, tgid 3948 (syz.1.1226), ts 154379783817, free_ts 143083089695 [ 193.719267][ T4864] post_alloc_hook+0x1f5/0x210 [ 193.724101][ T4864] prep_new_page+0x1c/0x110 [ 193.728647][ T4864] get_page_from_freelist+0x2d12/0x2d80 [ 193.734500][ T4864] __alloc_pages+0x1fa/0x610 [ 193.739139][ T4864] alloc_slab_page+0x6e/0xf0 [ 193.743871][ T4864] new_slab+0x98/0x3d0 [ 193.748001][ T4864] ___slab_alloc+0x6bd/0xb20 [ 193.752814][ T4864] __slab_alloc+0x5e/0xa0 [ 193.757175][ T4864] __kmem_cache_alloc_node+0x203/0x2c0 [ 193.762756][ T4864] __kmalloc_node_track_caller+0xa0/0x1e0 [ 193.768866][ T4864] krealloc+0x6f/0x110 [ 193.773089][ T4864] do_check+0x2d42/0xf070 [ 193.777470][ T4864] do_check_common+0x11ae/0x1950 [ 193.782626][ T4864] bpf_check+0x3f98/0x10d10 [ 193.787155][ T4864] bpf_prog_load+0x10f0/0x16a0 [ 193.792152][ T4864] __sys_bpf+0x57b/0x850 [ 193.796543][ T4864] page last free stack trace: [ 193.801236][ T4864] free_unref_page_prepare+0x742/0x750 [ 193.807080][ T4864] free_unref_page+0x95/0x540 [ 193.811813][ T4864] __free_pages+0x67/0x100 [ 193.816344][ T4864] __free_slab+0xca/0x1a0 [ 193.820810][ T4864] __unfreeze_partials+0x160/0x190 [ 193.825952][ T4864] put_cpu_partial+0xa9/0x100 [ 193.830670][ T4864] __slab_free+0x1c4/0x280 [ 193.835162][ T4864] ___cache_free+0xbf/0xd0 [ 193.839614][ T4864] qlist_free_all+0xc6/0x140 [ 193.844316][ T4864] kasan_quarantine_reduce+0x14a/0x170 [ 193.849797][ T4864] __kasan_slab_alloc+0x24/0x80 [ 193.854766][ T4864] slab_post_alloc_hook+0x4f/0x2d0 [ 193.859976][ T4864] __kmem_cache_alloc_node+0x192/0x2c0 [ 193.865584][ T4864] __kmalloc_node_track_caller+0xa0/0x1e0 [ 193.871516][ T4864] __alloc_skb+0x236/0x4b0 [ 193.876229][ T4864] inet6_netconf_notify_devconf+0x107/0x1c0 [ 193.882263][ T4864] [ 193.885054][ T4864] Memory state around the buggy address: [ 193.890809][ T4864] ffff88811929a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 193.899520][ T4864] ffff88811929a200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 193.908064][ T4864] >ffff88811929a280: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 193.917029][ T4864] ^ [ 193.922700][ T4864] ffff88811929a300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 193.931259][ T4864] ffff88811929a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 193.939513][ T4864] ================================================================== [ 193.949062][ T4864] Disabling lock debugging due to kernel taint [ 193.985087][ T28] audit: type=1400 audit(1776083207.447:148): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 194.048332][ T28] audit: type=1400 audit(1776083207.447:149): avc: denied { search } for pid=84 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 194.083486][ T28] audit: type=1400 audit(1776083207.447:150): avc: denied { write } for pid=84 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 194.115576][ T28] audit: type=1400 audit(1776083207.447:151): avc: denied { add_name } for pid=84 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 194.150587][ T28] audit: type=1400 audit(1776083207.447:152): avc: denied { create } for pid=84 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 194.179732][ T28] audit: type=1400 audit(1776083207.447:153): avc: denied { append open } for pid=84 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 194.204656][ T28] audit: type=1400 audit(1776083207.447:154): avc: denied { getattr } for pid=84 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1